Home

Description

Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) creates symlinks from the archive without validation, and the path guard (`writeable_path_from_extension`) only performs lexical prefix checks without resolving symlinks. An attacker can ship a tar that first creates a symlink inside the extension workdir pointing outside (e.g., `escape -> /`), then writes files through the symlink, causing writes to arbitrary host paths. This escapes the extension sandbox and enables code execution. Version 0.224.4 patches the issue.

PUBLISHED Reserved 2026-02-25 | Published 2026-02-25 | Updated 2026-02-26 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-61: UNIX Symbolic Link (Symlink) Following

Product status

< 0.224.4
affected

References

github.com/...es/zed/security/advisories/GHSA-59p4-3mhm-qm3r

cve.org (CVE-2026-27976)

nvd.nist.gov (CVE-2026-27976)

Download JSON