CVE-2026-22685

8.8 HIGH

📋 TL;DR

A path traversal vulnerability in DevToys allows malicious extension packages to write files outside the intended directory, potentially overwriting system files. This affects users running DevToys versions 2.0.0.0 through 2.0.8.0 who install third-party extensions. Successful exploitation could lead to arbitrary code execution or system compromise.

💻 Affected Systems

Products:
  • DevToys
Versions: 2.0.0.0 to 2.0.8.0
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable when processing extension packages.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary file overwrite leading to code execution with DevToys process privileges, potentially enabling privilege escalation or persistence mechanisms.

🟠

Likely Case

Local file corruption or malicious extension installation leading to data loss, configuration tampering, or secondary attack vectors.

🟢

If Mitigated

Limited to DevToys application directory if proper path validation is implemented, preventing system-wide impact.

🌐 Internet-Facing: LOW - Exploitation requires local access or user interaction to install malicious extension packages.
🏢 Internal Only: MEDIUM - Internal users could craft malicious extensions, but exploitation still requires user interaction to install them.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to install a malicious extension package. The vulnerability is straightforward to exploit once a malicious NUPKG archive is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.9.0

Vendor Advisory: https://github.com/DevToys-app/DevToys/security/advisories/GHSA-ggxr-h6fm-p2qh

Restart Required: Yes

Instructions:

1. Open DevToys application. 2. Navigate to Settings > About. 3. Check current version. 4. If below 2.0.9.0, download and install the latest version from the official GitHub releases page. 5. Restart DevToys after installation.

🔧 Temporary Workarounds

Disable Extension Installation

all

Prevent installation of any new extensions until patched.

No specific commands - manually avoid installing extensions

Restrict Extension Sources

all

Only install extensions from trusted, verified sources.

No specific commands - implement policy

🧯 If You Can't Patch

  • Run DevToys with minimal user privileges to limit potential damage from file overwrites.
  • Implement application whitelisting to prevent execution of unauthorized binaries that could be dropped via this vulnerability.

🔍 How to Verify

Check if Vulnerable:

Check DevToys version in Settings > About. If version is between 2.0.0.0 and 2.0.8.0 inclusive, the system is vulnerable.

Check Version:

On Windows: Check DevToys version in Settings > About. No CLI command available.

Verify Fix Applied:

After updating, verify version is 2.0.9.0 or higher in Settings > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations outside DevToys extensions directory
  • Failed path validation attempts in application logs

Network Indicators:

  • Downloads of NUPKG files from untrusted sources

SIEM Query:

Process: DevToys AND (FileWrite: *\..\* OR FileWrite: C:\Windows\* OR FileWrite: /etc/* OR FileWrite: /usr/*)

🔗 References

📤 Share & Export