Cross-Platform Desktop Application Packager Vulnerability in Pulpy
CVE-2026-44225

9.3CRITICAL

Key Information:

Vendor

Enesgkky

Status
Vendor
CVE Published:
12 May 2026

What is CVE-2026-44225?

The Pulpy application packager has a significant vulnerability in its handling of file system access through the pulpy.fs JavaScript API. Under versions prior to 0.1.1, Pulpy allows packaged web applications to perform read and write operations on arbitrary files within the user's home directory, including sensitive files such as SSH keys and AWS credentials. This issue arises from an incomplete blocklist in the validateFsPath() function, which is intended to sandbox filesystem access. Users of Pulpy should upgrade to version 0.1.1 promptly to mitigate potential security risks related to unauthorized data exposure.

Affected Version(s)

Pulpy < 0.1.1

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.