Zed, a code editor, has a Zip Slip (Path Traversal) vulnerability exists in its extension archive extraction functionality prior to version 0.224.4. The `extract_zip()` function in `crates/util/src/archive.rs` fails to validate ZIP entry filenames for path traversal sequences (e.g., `../`). This allows a malicious extension to write files outside its designated sandbox directory by downloading and extracting a crafted ZIP archive. Version 0.224.4 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/zed-industries/zed/security/advisories/GHSA-v385-xh3h-rrfr | Vendor Advisory Exploit |
Configurations
History
04 Mar 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zed:zed:*:*:*:*:*:*:*:* | |
| First Time |
Zed zed
Zed |
|
| References | () https://github.com/zed-industries/zed/security/advisories/GHSA-v385-xh3h-rrfr - Vendor Advisory, Exploit |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 00:16
Updated : 2026-03-04 03:16
NVD link : CVE-2026-27800
Mitre link : CVE-2026-27800
CVE.ORG link : CVE-2026-27800
JSON object : View
Products Affected
zed
- zed
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
