Input Director 1.4.3 contains an unquoted service path...
High severity
Unreviewed
Published
Jan 28, 2026
to the GitHub Advisory Database
•
Updated Jan 28, 2026
Description
Published by the National Vulnerability Database
Jan 28, 2026
Published to the GitHub Advisory Database
Jan 28, 2026
Last updated
Jan 28, 2026
Input Director 1.4.3 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions.
References