Back to CVE risk briefs

External risk intelligence

Pulpy could allow attackers to steal user credentials and sensitive files.

Desktop applications packaged with Pulpy could allow malicious applications to read or modify sensitive files on user workstations. This could expose critical cloud credentials, SSH keys, and configuration data, potentially compromising developer environments.

NVD published May 12, 2026 (3 days ago)

External risk briefCRITICAL

CVE-2026-44225

Halo Surface Signal

1/ 5

The vulnerability affects desktop applications running locally on user workstations. It is a client-side issue involving file system access within the local host environment, not a network-accessible service, web interface, or public-facing endpoint.

Exposure facts

H – Horizon Alert

Pulpy, a tool used to package web applications, contains a security vulnerability that may allow unauthorized access to the underlying computer's files. Due to incomplete security controls within the software, applications built with this tool can read or modify files within a user's home directory. This creates a risk where sensitive information, such as digital security keys or cloud credentials, could be accessed or altered by the packaged application.

A – Asset Exposure

This vulnerability impacts desktop applications created using Pulpy, which operate locally on user workstations. Because these applications interact directly with the host system, they may gain unauthorized access to sensitive files within a user's home directory. This could potentially expose critical information, including credentials, SSH keys, and cloud configuration files, to the packaged application. This risk is inherent to the local environment where the application is installed and executed.

L – Live Threat

This security oversight in the application packager could potentially grant packaged web applications unintended access to sensitive files on the host system. Currently, the available context does not indicate active exploitation or observed targeting of this vulnerability. We have found no evidence of public exploit code or malicious campaign activity associated with this issue at this time.

O – Operational Fix

We recommend updating your Pulpy application packaging software to the latest release to address the reported file system access vulnerability. Applying this update will resolve the current sandbox limitation, effectively preventing unauthorized access to sensitive files within user directories. Please task your development teams with scheduling and validating this update across all affected application packaging workflows.

References