CVE-2026-28208

Source
https://cve.org/CVERecord?id=CVE-2026-28208
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28208.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-28208
Aliases
Published
2026-02-26T22:20:03.765Z
Modified
2026-03-03T02:56:59.128703Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Junrar has arbitrary file write due to backslash path traversal bypass in LocalFolderExtractor on Linux/Unix
Details

Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in LocalFolderExtractor allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28208.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/junrar/junrar

Affected ranges

Type
GIT
Repo
https://github.com/junrar/junrar
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

junrar-0.*
junrar-0.6
junrar-0.7
junrar-1.*
junrar-1.0.0
junrar-1.0.1
junrar-2.*
junrar-2.0.0
junrar-3.*
junrar-3.0.0
junrar-3.1.0
junrar-3.1.1
junrar-4.*
junrar-4.0.0
v4.*
v4.0.0
v5.*
v5.0.0
v6.*
v6.0.0
v6.0.1
v7.*
v7.0.0
v7.1.0
v7.2.0
v7.3.0
v7.4.0
v7.4.1
v7.5.0
v7.5.1
v7.5.2
v7.5.3
v7.5.4
v7.5.5
v7.5.6
v7.5.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28208.json"