Home

Description

NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, NanaZip’s `.NET Single File Application` parser has an out-of-bounds read vulnerability in manifest parsing. A crafted bundle can provide a malformed `RelativePathLength` so the parser constructs a `std::string` from memory beyond `HeaderBuffer`, leading to crash and potential in-process memory disclosure. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.

PUBLISHED Reserved 2026-02-23 | Published 2026-02-25 | Updated 2026-02-26 | Assigner GitHub_M




MEDIUM: 5.1CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-125: Out-of-bounds Read

Product status

>= 5.0.1252.0, < 6.0.1638.0
affected

>= 6.1, < 6.5.1638.0
affected

References

github.com/...anaZip/security/advisories/GHSA-vr4w-xc78-w6fv exploit

github.com/...anaZip/security/advisories/GHSA-vr4w-xc78-w6fv

cve.org (CVE-2026-27709)

nvd.nist.gov (CVE-2026-27709)

Download JSON