STIGQter is an open-source reimplementation of DISA's STIG Viewer. From 0.1.2 to before 1.2.7, an attacker can achieve local code execution (LCE) with the privileges of the user running STIGQter. This requires user interaction: the victim must open the malicious .stigqter file and explicitly run the "Export HTML" action. This vulnerability is fixed in 1.2.7.
History

Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Squinky86
Squinky86 stigqter
Vendors & Products Squinky86
Squinky86 stigqter

Thu, 14 May 2026 18:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description STIGQter is an open-source reimplementation of DISA's STIG Viewer. From 0.1.2 to before 1.2.7, an attacker can achieve local code execution (LCE) with the privileges of the user running STIGQter. This requires user interaction: the victim must open the malicious .stigqter file and explicitly run the "Export HTML" action. This vulnerability is fixed in 1.2.7.
Title STIGQter: Arbitrary File Write leading to Local Code Execution via Export HTML
Weaknesses CWE-22
CWE-73
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T18:01:38.091Z

Reserved: 2026-04-30T18:49:06.711Z

Link: CVE-2026-42881

cve-icon Vulnrichment

Updated: 2026-05-14T18:00:55.846Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T15:16:46.887

Modified: 2026-05-14T18:16:49.083

Link: CVE-2026-42881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:21:16Z