Description
Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an alphanumeric encoded payload in the Folder Path field. Attackers can trigger the vulnerability through the System Compare feature by pasting a crafted buffer overflow payload into the left-hand side Folder Path field and clicking the scale icon to execute shellcode with application privileges.
Published: 2026-03-22
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Arbitrary Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a local structured exception handling (SEH) buffer overflow that is triggered by supplying an alphanumeric encoded payload in the Folder Path field. The flaw allows an attacker who can run the application to execute arbitrary code with the privileges of the application. The exploit path involves using the System Compare feature; the attacker pastes the malicious payload into the left‑hand side Folder Path field and clicks the scale icon to launch the shellcode.

Affected Systems

Admin Express Software, version 1.2.5.485. This release is affected; no other versions are listed in the advisory. The vulnerability applies to installations of the desktop application on Windows platforms.

Risk and Exploitability

The CVSS score of 8.5 reflects a high‑severity local exploit requiring the attacker to have access to the affected machine. Because the vulnerability is local, it does not pose an immediate remote attack surface, and EPSS data is not available. The flaw is not currently listed in CISA's KEV catalog. Exploitation requires an attacker already present on the system or with local user credentials; the attacker can then run arbitrary code with application privileges. Given the high impact of code execution and the popularity of the application, the risk remains substantial. Administrators should treat it as a high‑severity local privilege escalation and coordinate patching as soon as possible.

Generated by OpenCVE AI on March 22, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest version of Admin Express that addresses the SEH buffer overflow.
  • If a patch is not yet available, contact the vendor for an update or advisory.
  • Restrict local access to the application to trusted users only.
  • Avoid using the System Compare feature until the issue is resolved.
  • If the application is not critical, consider uninstalling or disabling it.

Generated by OpenCVE AI on March 22, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Admin-express
Admin-express admin-express
Vendors & Products Admin-express
Admin-express admin-express

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an alphanumeric encoded payload in the Folder Path field. Attackers can trigger the vulnerability through the System Compare feature by pasting a crafted buffer overflow payload into the left-hand side Folder Path field and clicking the scale icon to execute shellcode with application privileges.
Title Admin Express 1.2.5.485 Local SEH Buffer Overflow via Folder Path
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Admin-express Admin-express
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T15:14:32.531Z

Reserved: 2026-03-22T13:21:59.416Z

Link: CVE-2019-25612

cve-icon Vulnrichment

Updated: 2026-03-24T14:08:31.800Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:29.550

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25612

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:04Z

Weaknesses