CVE-2026-20613

The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:container:*:*:*:*:*:swift:*:*
cpe:2.3:a:apple:containerization:*:*:*:*:*:swift:*:*

History

27 Jan 2026, 20:17

Type Values Removed Values Added
CPE cpe:2.3:a:apple:containerization:*:*:*:*:*:swift:*:*
cpe:2.3:a:apple:container:*:*:*:*:*:swift:*:*
References () https://github.com/apple/containerization/security/advisories/GHSA-cq3j-qj2h-6rv3 - () https://github.com/apple/containerization/security/advisories/GHSA-cq3j-qj2h-6rv3 - Exploit, Vendor Advisory
First Time Apple
Apple container
Apple containerization

23 Jan 2026, 15:16

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

23 Jan 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-23 00:15

Updated : 2026-01-27 20:17


NVD link : CVE-2026-20613

Mitre link : CVE-2026-20613

CVE.ORG link : CVE-2026-20613


JSON object : View

Products Affected

apple

  • containerization
  • container
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')