radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory. | |
| Title | radare2 < 6.1.4 Project Notes Path Traversal via Symlink | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-23T20:39:48.613Z
Reserved: 2026-04-23T20:36:46.378Z
Link: CVE-2026-6941
No data.
Status : Received
Published: 2026-04-23T21:16:06.790
Modified: 2026-04-23T21:16:06.790
Link: CVE-2026-6941
No data.
OpenCVE Enrichment
No data.