CVE-2026-24846
MEDIUMChainguard-dev Malcontent < 1.20.3 - Path Traversal
Title source: ruleDescription
malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 1.8.0 and prior to version 1.20.3, malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The `handleSymlink` function received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory. Version 1.20.3 introduces fixes that swap handleSymlink arguments, validate symlink location, and validate symlink targets that resolve within an extraction directory.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/chainguard-dev/malcontent/security/advisories/GHSA-923j-vrcg-hxwh
Patch x_refsource_misc
https://github.com/chainguard-dev/malcontent/commit/259fca5abc004f3ab238895463ef280a87f30e96
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
0.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
CWE-683
Status
published
Products (2)
chainguard/malcontent
1.8.0 - 1.20.3
chainguard-dev/malcontent
1.8.0 - 1.20.3Go
Published
Jan 29, 2026
Tracked Since
Feb 18, 2026