We found results for “”
CVE-2026-24686
Good to know:
Date: January 26, 2026
go-tuf is a Go implementation of The Update Framework (TUF). go-tuf's TAP 4 Multirepo Client uses the map file repository name string ("repoName") as a filesystem path component when selecting the local metadata cache directory. Starting in version 2.0.0 and prior to version 2.4.1, if an application accepts a map file from an untrusted source, an attacker can supply a "repoName" containing traversal (e.g., "../escaped-repo") and cause go-tuf to create directories and write the root metadata file outside the intended "LocalMetadataDir" cache base, within the running process's filesystem permissions. Version 2.4.1 contains a patch.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix
Upgrade Version
Upgrade to version github.com/theupdateframework/go-tuf/v2 - v2.4.1;https://github.com/theupdateframework/go-tuf.git - v2.4.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


