CVE-2026-1186
📋 TL;DR
EAP Legislator contains a path traversal vulnerability in its file extraction functionality. Attackers can craft malicious zipx archives that, when opened by victims, extract files to arbitrary system locations outside intended directories. This affects all users running vulnerable versions of EAP Legislator software.
💻 Affected Systems
- EAP Legislator
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via extraction of malicious executables to startup directories or critical system paths, leading to persistent malware installation or system takeover.
Likely Case
Local file system manipulation allowing attackers to overwrite system files, install backdoors, or extract sensitive data to attacker-controlled locations.
If Mitigated
Limited impact with proper file validation and restricted user permissions preventing writes to critical system directories.
🎯 Exploit Status
Exploitation requires victim interaction to open malicious zipx file; no authentication needed for file extraction functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.25a
Vendor Advisory: https://abcpro.pl/eap-legislator
Restart Required: Yes
Instructions:
1. Download version 2.25a from official vendor site. 2. Backup current configuration. 3. Install update. 4. Restart application. 5. Verify version shows 2.25a.
🔧 Temporary Workarounds
Disable zipx file association
allPrevent EAP Legislator from automatically opening zipx files
Windows: assoc .zipx=
Linux/macOS: Remove .zipx file association from EAP Legislator preferences
Restrict file extraction permissions
allConfigure application to run with limited user privileges
Windows: Run as standard user without admin rights
Linux/macOS: chmod 755 /path/to/eap-legislator && run as non-root user
🧯 If You Can't Patch
- Implement application whitelisting to block execution of files extracted to unauthorized locations
- Deploy endpoint detection that monitors for file writes to system directories from EAP Legislator process
🔍 How to Verify
Check if Vulnerable:
Check EAP Legislator version; if below 2.25a, system is vulnerable
Check Version:
EAP Legislator: Help -> About or eap-legislator --version
Verify Fix Applied:
Verify version shows 2.25a and test with known safe zipx files to confirm proper extraction path validation
📡 Detection & Monitoring
Log Indicators:
- File extraction events to paths containing '..' or absolute system paths
- Process creation from EAP Legislator writing to system directories
Network Indicators:
- Downloads of zipx files followed by file system writes to unusual locations
SIEM Query:
process_name:"eap-legislator" AND file_write_path:(C:\Windows\* OR /etc/* OR /usr/* OR ..)