Description
Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.12 and before allows a local attacker to execute arbitrary code via a crafted file
Published: 2026-04-20
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Arbitrary Code Execution via insecure permissions
Action: Patch Now
AI Analysis

Impact

Based on the updated description, the vulnerability permits a local attacker who can place a crafted file in a directory monitored by DeepCreative to trigger execution of arbitrary code due to insecure file permissions (CWE‑277). The likely attack vector is local file placement. The attacker controls the file’s content, and the application will execute it, potentially enabling unauthorized control over the application and the host operating system. The impact compromises confidentiality, integrity, and availability of the affected host.

Affected Systems

The affected product is DeepCool DeepCreative, versions prior to 1.2.12. No other vendors or products are listed in the CNA data.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, and the EPSS score is less than 1%. Although it is not listed in CISA’s KEV catalog, this local code execution vulnerability is a very high‑risk condition. If the attacker can write files into a directory monitored by DeepCreative, they can execute arbitrary code without additional authentication. The exploitation likelihood is high for systems where the application runs with elevated privileges or unsegmented file permissions, and administrators should assume the risk remains elevated until a vendor update is applied.

Generated by OpenCVE AI on April 29, 2026 at 00:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update DeepCool DeepCreative to a version newer than 1.2.12 that corrects the insecure permission handling.
  • Reconfigure the file system permissions for DeepCreative directories so that only the application process can read and execute files; set directories to mode 750 or stricter.
  • Restrict local users from creating or modifying files in the DeepCreative installation directory, and enforce strict access controls on any directory that the application scans for configuration or executable files.

Generated by OpenCVE AI on April 29, 2026 at 00:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
Title Local Arbitrary Code Execution via Insecure Permissions in DeepCool DeepCreative

Mon, 27 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Deepcool
Deepcool deepcreative
CPEs cpe:2.3:a:deepcool:deepcreative:*:*:*:*:*:*:*:*
Vendors & Products Deepcool
Deepcool deepcreative

Thu, 23 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.7 and before allows a local attacker to execute arbitrary code via a crafted file Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.12 and before allows a local attacker to execute arbitrary code via a crafted file

Mon, 20 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Title Local Arbitrary Code Execution via Insecure Permissions in DeepCool DeepCreative

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-277
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.7 and before allows a local attacker to execute arbitrary code via a crafted file
References

Subscriptions

Deepcool Deepcreative
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-23T13:40:34.695Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30266

cve-icon Vulnrichment

Updated: 2026-04-20T17:25:26.918Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-20T17:16:33.377

Modified: 2026-04-27T16:42:44.323

Link: CVE-2026-30266

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T00:30:16Z

Weaknesses