Home Stackfield CVE-2026-28373
Back to Stackfield

CVE-2026-28373

Stackfield Desktop App

Stackfield CVSS 9.6 Updated April 6, 2026

Executive Risk Summary

"The Stackfield Desktop App is vulnerable to a path traversal vulnerability, allowing malicious exports to write arbitrary content to any path on the victim's filesystem. This vulnerability can lead to unauthorized access and modification of sensitive data."

Anticipated Attack Path

  1. 1. An attacker crafts a malicious export with a specially designed filePath property
  2. 2. The Stackfield Desktop App processes the malicious export, allowing arbitrary file writes
  3. 3. The attacker gains unauthorized access to sensitive data and system resources

Am I Vulnerable?

  • Is the Stackfield Desktop App version older than 1.10.2?
  • Are macOS or Windows systems used to run the Stackfield Desktop App?
  • Have patches or updates been applied to address the CVE-2026-28373 vulnerability?

Operational Audit Arsenal

Target Type Application
Target Asset Stackfield Desktop App
Standard Path Filesystem / User Space

Manual Verification Required

This is a non-Windows asset (Stackfield). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only updates the Stackfield Desktop App

Internal Work Notes

Urgent: Patch Stackfield Desktop App to version 1.10.2 or later to mitigate CVE-2026-28373 path traversal vulnerability

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.