Home

Description

A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.

PUBLISHED Reserved 2026-02-11 | Published 2026-02-11 | Updated 2026-02-12 | Assigner redhat




HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

External Control of File Name or Path

Product status

Default status
unknown

Timeline

2026-02-11:Reported to Red Hat.
2026-02-11:Made public.

References

access.redhat.com/security/cve/CVE-2026-26157 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2439039 (RHBZ#2439039) issue-tracking

git.busybox.net/...=3fb6b31c716669e12f75a2accd31bb7685b1a1cb

cve.org (CVE-2026-26157)

nvd.nist.gov (CVE-2026-26157)

Download JSON