CVE-2026-24686

Source
https://cve.org/CVERecord?id=CVE-2026-24686
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24686.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24686
Aliases
Downstream
Related
Published
2026-01-27T00:45:43.422Z
Modified
2026-01-29T06:50:56.211989Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
go-tuf Path Traversal in TAP 4 Multirepo Client Allows Arbitrary File Write via Malicious Repository Names
Details

go-tuf is a Go implementation of The Update Framework (TUF). go-tuf's TAP 4 Multirepo Client uses the map file repository name string (repoName) as a filesystem path component when selecting the local metadata cache directory. Starting in version 2.0.0 and prior to version 2.4.1, if an application accepts a map file from an untrusted source, an attacker can supply a repoName containing traversal (e.g., ../escaped-repo) and cause go-tuf to create directories and write the root metadata file outside the intended LocalMetadataDir cache base, within the running process's filesystem permissions. Version 2.4.1 contains a patch.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24686.json"
}
References

Affected packages

Git / github.com/theupdateframework/go-tuf

Affected ranges

Type
GIT
Repo
https://github.com/theupdateframework/go-tuf
Events

Affected versions

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.1.0
v2.1.1
v2.2.0
v2.3.0
v2.3.1
v2.4.0

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24686.json"