CVE-2026-30279
Published: 31 March 2026
Summary
CVE-2026-30279 is a high-severity Path Traversal (CWE-22) vulnerability in Squareapps My Location. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates inputs during the file import process to block malicious file paths and contents that enable arbitrary file overwrites.
Enforces access control policies to restrict the file import process from writing to unauthorized critical internal files.
Performs integrity checks on critical files to detect unauthorized overwrites from the vulnerable file import process.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file overwrite (CWE-22) in local app import process directly enables local code execution via critical file replacement, mapping to exploitation for client execution and privilege escalation.
NVD Description
An arbitrary file overwrite vulnerability in Squareapps LLC My Location Travel Timeline v11.80 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
Deeper analysisAI
CVE-2026-30279 is an arbitrary file overwrite vulnerability (CWE-22) in Squareapps LLC My Location Travel Timeline version 11.80. The issue arises in the file import process, which allows attackers to overwrite critical internal files. This can lead to arbitrary code execution or information exposure. The vulnerability has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-31T18:16:47.003.
A local attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. By crafting a malicious file for import, the attacker can target and overwrite sensitive internal files, achieving high impacts on confidentiality, integrity, and availability. Potential outcomes include executing arbitrary code on the system or exposing sensitive information stored in overwritten files.
Mitigation details and additional advisories are available in the following references: http://my.com, https://github.com/Secsys-FDU/AF_CVEs/issues/28, https://lightapp3.firebaseapp.com/, and https://secsys.fudan.edu.cn/.
Details
- CWE(s)