HomeCVE-2026-24846

CVE-2026-24846

MEDIUM
5.5CVSS
Published: 2026-01-29
Updated: 2026-01-29
AI Analysis

Description

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 1.8.0 and prior to version 1.20.3, malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The `handleSymlink` function received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory. Version 1.20.3 introduces fixes that swap handleSymlink arguments, validate symlink location, and validate symlink targets that resolve within an extraction directory.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Attack Vector
local
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-22CWE-683

Metadata

Primary Vendor
UNKNOWN
Published
1/29/2026
Last Modified
1/29/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

No affected products information available.

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-24846 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com