CVE-2026-6941 PUBLISHED

radare2 < 6.1.4 Project Notes Path Traversal via Symlink

Assigner: VulnCheck
Reserved: 23.04.2026 Published: 23.04.2026 Updated: 23.04.2026

radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor radareorg
Product radare2
Versions Default: unaffected
  • unaffected from 0 to 4bcdee725ff0754ed721a98789c0af371c5f32a4 (excl.)
  • affected from 0 to 6.1.4 (excl.)

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE