Prey 1.9.6 contains an unquoted service path...
High severity
Unreviewed
Published
Jan 28, 2026
to the GitHub Advisory Database
•
Updated Jan 28, 2026
Description
Published by the National Vulnerability Database
Jan 28, 2026
Published to the GitHub Advisory Database
Jan 28, 2026
Last updated
Jan 28, 2026
Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.
References