CVE-2026-27704 PUBLISHED

Dart SDK and Flutter SDK have Zip slip in Dart Pub package extraction

Assigner: GitHub_M
Reserved: 23.02.2026 Published: 25.02.2026 Updated: 25.02.2026

The Dart and Flutter SDKs provide software development kits for the Dart programming language. In versions of the Dart SDK prior to 3.11.0 and the Flutter SDK prior to version 3.41.0, when the pub client (dart pub and flutter pub) extracts a package in the pub cache, a malicious package archive can have files extracted outside the destination directory in the PUB_CACHE. A fix has been landed in commit 26c6985c742593d081f8b58450f463a584a4203a. By normalizing the file path before writing file, the attacker can no longer traverse up via a symlink. This patch is released in Dart 3.11.0 and Flutter 3.41.0.vAll packages on pub.dev have been vetted for this vulnerability. New packages are no longer allowed to contain symlinks. The pub client itself doesn't upload symlinks, but duplicates the linked entry, and has been doing this for years. Those whose dependencies are all from pub.dev, third-party repositories trusted to not contain malicious code, or git dependencies are not affected by this vulnerability.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
CVSS Score: 6.6

Product Status

Vendor dart-lang
Product sdk
Versions
  • Version < 3.11.0 is affected
Vendor dart-lang
Product flutter
Versions
  • Version < 3.41.0 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE