Description
STIGQter is an open-source reimplementation of DISA's STIG Viewer. From 0.1.2 to before 1.2.7, an attacker can achieve local code execution (LCE) with the privileges of the user running STIGQter. This requires user interaction: the victim must open the malicious .stigqter file and explicitly run the "Export HTML" action. This vulnerability is fixed in 1.2.7.
Published: 2026-05-14
Score: 8.4 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in STIGQter allows an attacker to perform an arbitrary file write when a malicious .stigqter file is opened and the user explicitly selects the "Export HTML" action. This flaw leads to local code execution with the privileges of the user running the application and is associated with CWE-22 and CWE-73 weakness types. The exploitation may compromise system integrity and confidentiality if the attacker can write files to arbitrary locations or overwrite critical data.

Affected Systems

The issue affects the squinky86:STIGQter open‑source reimplementation of DISA's STIG Viewer. Versions from 0.1.2 up to but not including 1.2.7 are vulnerable; all later releases contain a fix.

Risk and Exploitability

The CVSS score of 8.4 indicates a high severity risk. The EPSS score is not available, so the probability of exploitation cannot be quantified, but the vulnerability is well known and listed in public advisories. It is not flagged in the CISA KEV catalog. Exploitation requires local user interaction: the victim must open a malicious file and choose to run the Export HTML command, after which the attacker gains code execution with the running user's rights. The affected scope is limited to the local machine that runs STIGQter.

Generated by OpenCVE AI on May 14, 2026 at 16:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade STIGQter to version 1.2.7 or later to remove the flaw.
  • Avoid opening or executing unknown .stigqter files, especially those received via untrusted channels.
  • Disable or restrict the Export HTML feature if the application allows configuration; otherwise use application whitelisting tools to prevent execution of unapproved binaries.

Generated by OpenCVE AI on May 14, 2026 at 16:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 18:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description STIGQter is an open-source reimplementation of DISA's STIG Viewer. From 0.1.2 to before 1.2.7, an attacker can achieve local code execution (LCE) with the privileges of the user running STIGQter. This requires user interaction: the victim must open the malicious .stigqter file and explicitly run the "Export HTML" action. This vulnerability is fixed in 1.2.7.
Title STIGQter: Arbitrary File Write leading to Local Code Execution via Export HTML
Weaknesses CWE-22
CWE-73
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T18:01:38.091Z

Reserved: 2026-04-30T18:49:06.711Z

Link: CVE-2026-42881

cve-icon Vulnrichment

Updated: 2026-05-14T18:00:55.846Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T15:16:46.887

Modified: 2026-05-14T18:16:49.083

Link: CVE-2026-42881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T16:30:24Z

Weaknesses