CVE-2026-6941

radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*

History

27 Apr 2026, 14:57

Type Values Removed Values Added
CWE CWE-22
First Time Radare
Radare radare2
References () https://github.com/radareorg/radare2/commit/4bcdee725ff0754ed721a98789c0af371c5f32a4 - () https://github.com/radareorg/radare2/commit/4bcdee725ff0754ed721a98789c0af371c5f32a4 - Patch
References () https://github.com/radareorg/radare2/pull/25831 - () https://github.com/radareorg/radare2/pull/25831 - Exploit, Issue Tracking, Third Party Advisory
References () https://www.vulncheck.com/advisories/radare2-project-notes-path-traversal-via-symlink - () https://www.vulncheck.com/advisories/radare2-project-notes-path-traversal-via-symlink - Third Party Advisory
CPE cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*

23 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 21:16

Updated : 2026-04-27 14:57


NVD link : CVE-2026-6941

Mitre link : CVE-2026-6941

CVE.ORG link : CVE-2026-6941


JSON object : View

Products Affected

radare

  • radare2
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')