uutils coreutils EUVD-2026-24963

| CVE-2026-35338 HIGH
Path Traversal (CWE-22)
2026-04-22 canonical GHSA-9gqx-53gp-c8g3
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 23, 2026 - 00:16 vuln.today

DescriptionNVD

A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not canonicalize the path. An attacker or accidental user can use path variants such as /../ or symbolic links to execute destructive recursive operations (e.g., chmod -R 000) on the entire root filesystem, leading to system-wide permission loss and potential complete system breakdown.

AnalysisAI

The chmod utility in uutils coreutils versions before 0.6.0 allows local authenticated users to bypass --preserve-root protections and recursively modify permissions on the entire root filesystem. The implementation fails to canonicalize paths before validation, accepting path traversal variants like /../ or symbolic links that resolve to root. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running uutils coreutils and document current versions. Within 7 days: Update uutils coreutils to version 0.6.0 or later on all affected systems; test in non-production environment first. …

Sign in for detailed remediation steps.

Share

EUVD-2026-24963 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy