Home

Description

SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded. This issue was fixed in version 1.2.1.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-15 | Updated 2026-05-15 | Assigner CERT-PL




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

Any version before 1.2.1
affected

Credits

Mariusz Maik finder

References

cert.pl/posts/2026/05/CVE-2026-44088 third-party-advisory

www.elektronicznypodpis.pl/ product

cve.org (CVE-2026-44088)

nvd.nist.gov (CVE-2026-44088)

Download JSON