radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.
References
| Link | Resource |
|---|---|
| https://github.com/radareorg/radare2/commit/4bcdee725ff0754ed721a98789c0af371c5f32a4 | Patch |
| https://github.com/radareorg/radare2/pull/25831 | Exploit Issue Tracking Third Party Advisory |
| https://www.vulncheck.com/advisories/radare2-project-notes-path-traversal-via-symlink | Third Party Advisory |
Configurations
History
27 Apr 2026, 14:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 | |
| First Time |
Radare
Radare radare2 |
|
| References | () https://github.com/radareorg/radare2/commit/4bcdee725ff0754ed721a98789c0af371c5f32a4 - Patch | |
| References | () https://github.com/radareorg/radare2/pull/25831 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/radare2-project-notes-path-traversal-via-symlink - Third Party Advisory | |
| CPE | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* |
23 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 21:16
Updated : 2026-04-27 14:57
NVD link : CVE-2026-6941
Mitre link : CVE-2026-6941
CVE.ORG link : CVE-2026-6941
JSON object : View
Products Affected
radare
- radare2
