Home

Description

Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helping to measure code coverage for functional and integration tests within GitHub Actions. Prior to version 0.2.2, the `sanitizeArchivePath` function in `webserver/api/v1/decoder.go` (lines 80-88) is vulnerable to a path traversal bypass due to a missing trailing path separator in the `strings.HasPrefix` check. A crafted tar archive can write files outside the intended destination directory. Version 0.2.2 fixes the issue.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-18 | Updated 2026-03-19 | Assigner GitHub_M




HIGH: 8.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:L/SA:L

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 0.2.2
affected

References

github.com/.../romeo/security/advisories/GHSA-p799-g7vv-f279 exploit

github.com/.../romeo/security/advisories/GHSA-p799-g7vv-f279

github.com/...ommit/c2ebcfb9f305fd5f6ef68858de82507dbac10263

cve.org (CVE-2026-32805)

nvd.nist.gov (CVE-2026-32805)

Download JSON