The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-good inputs) does not sanitize output filenames. Extracting a malicious archive file with the "pack" subcommand can write files to arbitrary locations on the filesystem.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 CWE-73 |
Thu, 07 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-good inputs) does not sanitize output filenames. Extracting a malicious archive file with the "pack" subcommand can write files to arbitrary locations on the filesystem. | |
| Title | Invoking "go tool pack" does not sanitize output paths in cmd/go | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-07T19:41:18.993Z
Reserved: 2026-04-07T18:13:03.524Z
Link: CVE-2026-39817
No data.
Status : Awaiting Analysis
Published: 2026-05-07T20:16:42.983
Modified: 2026-05-07T20:38:04.860
Link: CVE-2026-39817
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:30:25Z
Weaknesses
No weakness.