VYPR
Low severity3.3NVD Advisory· Published May 12, 2026· Updated May 12, 2026

CVE-2026-41530

CVE-2026-41530

Description

The automatic folder creation feature of Lhaz and Lhaz+ provided by Chitora soft contains a path traversal vulnerability. When the affected product is configured with the automatic folder creation feature enabled, and a product user tries to extract an archive file which has a crafted file name, then the archived files may be extracted to an unexpected folder.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Lhaz and Lhaz+ versions prior to 2.6.4 and 3.6.4 contain a path traversal vulnerability in path traversal vulnerability in the automatic folder creation feature, allowing extraction to an unexpected folder.

Vulnerability

Overview

Lhaz and Lhaz+ are archive extraction utilities provided by Chitora soft. When the automatic folder creation feature is enabled, the software normally creates a folder named after the archive file and extracts contents into it. However, due to improper handling of crafted archive file names, the folder creation may be bypassed, causing files to be extracted to the parent directory instead of the intended subfolder [1][2]. This is classified as a path traversal vulnerability (CWE-22).

Exploitation

Conditions

Exploitation requires the user to have the automatic folder creation feature enabled and to extract a specially crafted archive file. The attack is local and requires user interaction (e.g., double-clicking the archive). No authentication is needed, but the user must be tricked into extracting a malicious archive. The CVSS v3 base score is 3.3 (Low), reflecting the need for user interaction and the limited scope of impact [2].

Impact

If exploited, an attacker could write files to an unexpected folder, potentially higher-privilege directory (e.g., the user's startup folder or system directories). This could lead to arbitrary code execution with the user's privileges, enabling installation of malware, data modification, or deletion [1][2]. The impact is limited to the user's session and does not directly compromise other users or system-level integrity.

Mitigation

The developer has released patched versions: Lhaz 2.6.4 and Lhaz+ 3.6.4. Users should update to these versions immediately. No workaround is no workaround other workaround is available; disabling the automatic folder creation feature may reduce risk but may not fully prevent exploitation [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.