CVE-2026-44088 PUBLISHED

Remote Code Execution in SzafirHost

Assigner: CERT-PL
Reserved: 05.05.2026 Published: 15.05.2026 Updated: 15.05.2026

SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded.

This issue was fixed in version 1.2.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
CVSS Score: 8.6

Product Status

Vendor Krajowa Izba Rozliczeniowa
Product SzafirHost
Versions Default: unaffected
  • affected from 0 to 1.2.1 (excl.)

Credits

  • Mariusz Maik finder

References

Problem Types

  • CWE-434 Unrestricted Upload of File with Dangerous Type CWE