CVE-2026-5789

NameCVE-2026-5789
DescriptionVulnerability related to an unquoted search path in CivetWeb v1.16. This vulnerability allows a local attacker to execute arbitrary code with elevated privileges by placing a malicious executable in a directory that is scanned before the intended application path (C:\Program Files\CivetWeb\CivetWeb.exe --), due to the absence of quotes in the service configuration.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
civetweb (PTS)bullseye1.13+dfsg-5fixed
bookworm1.15+dfsg-4fixed
trixie1.16+dfsg-2+deb13u1fixed
forky, sid1.16+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
civetwebsource(unstable)(not affected)

Notes

- civetweb <not-affected> (Not applicable to Civetweb as packaged on Linux)

Search for package or bug name: Reporting problems