CVE-2026-42095 — bookserver in KDE Arianna before 26.04.1 allows attackers

CVE-2026-42095 — bookserver in KDE Arianna before 26.04.1 allows attackers

CVE-2026-42095 — bookserver in KDE Arianna before 26.04.1 allows attackers to read files over a socket connection by guessing a URL.

What This Means For You

  • If your environment is affected by CWE-306, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-42095 updates and patches.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-42095 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

medium T1190 Initial Access

CVE-2026-42095 - KDE Arianna bookserver File Read via Socket Guessing

Sigma YAML — free preview
title: CVE-2026-42095 - KDE Arianna bookserver File Read via Socket Guessing
id: scw-2026-04-24-ai-1
status: experimental
level: medium
description: |
  Detects attempts to exploit CVE-2026-42095 by observing web server requests to the '/bookserver/' path that contain directory traversal sequences ('..%2f') and result in a successful response (HTTP 200). This indicates an attacker is likely attempting to read arbitrary files over a socket connection by guessing URLs.
author: SCW Feed Engine (AI-generated)
date: 2026-04-24
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-42095/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|startswith:
          - '/bookserver/'
      cs-uri-query|contains:
          - '..%2f'
      sc-status:
          - 200
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-42095 vulnerability CVE-2026-42095
CWE-306 weakness CWE-306
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 18:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related Posts

Critical RCE in BridgeHead FileStore via Default Axis2 Credentials

CVE-2026-39920 — BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that...

vulnerabilityCVEcriticalhigh-severitycwe-1188cwe-1391
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 3 IOCs /⚙ 4 Sigma

Mythos Unauthorized Access, CISA Nom Withdrawal, New Display Security

SecurityWeek reported on several under-the-radar stories this week, including unauthorized access to Mythos, the withdrawal of Plankey's CISA nomination, and the introduction of a new...

threat-intelvulnerabilitydata-breach
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs

China Targets NASA with Phishing for Defense Software

The NASA Office of Inspector General (OIG) has exposed a sophisticated spear-phishing operation orchestrated by a Chinese national. Posing as a U.S. researcher, the attacker...

threat-intelvulnerabilitycloudmicrosoftphishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma