Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    HPE security advisory (AV26-325) – Canadian Centre for Cyber Security

    April 11, 2026

    CIS Helps Strengthen Cybersecurity in Energy & Utilities

    April 11, 2026

    CVE-2026-32146 | THREATINT

    April 11, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»CVE-2026-32146 | THREATINT
    Alerts

    CVE-2026-32146 | THREATINT

    adminBy adminApril 11, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Home

    Description

    Improper path validation vulnerability in the Gleam compiler’s handling of git dependencies allows arbitrary file system modification during dependency download. Dependency names from gleam.toml and manifest.toml are incorporated into filesystem paths without sufficient validation or confinement to the intended dependency directory, allowing attacker-controlled paths (via relative traversal such as ../ or absolute paths) to target filesystem locations outside that directory. When resolving git dependencies (e.g. via gleam deps download), the computed path is used for filesystem operations including directory deletion and creation. This vulnerability occurs during the dependency resolution and download phase, which is generally expected to be limited to fetching and preparing dependencies within a confined directory. A malicious direct or transitive git dependency can exploit this issue to delete and overwrite arbitrary directories outside the intended dependency directory, including attacker-chosen absolute paths, potentially causing data loss. In some environments, this may be further leveraged to achieve code execution, for example by overwriting git hooks or shell configuration files. This issue affects Gleam from 1.9.0-rc1 until 1.15.3 and 1.16.0-rc1.

    PUBLISHED Reserved 2026-03-10 | Published 2026-04-11 | Updated 2026-04-11 | Assigner EEF

    MEDIUM: 6.2CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H

    Problem types

    CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

    Product status

    Default status
    unaffected

    1.9.0-rc1 (semver) before *
    affected

    Default status
    unaffected

    1.9.0-rc1 (semver) before *
    affected

    a4fde22445ab8e5cc79c2ff48971616cb570702c (git) before *
    affected

    Credits

    John Downey remediation developer

    Louis Pilfold analyst

    Jonatan Männchen / EEF coordinator

    References

    github.com/…/gleam/security/advisories/GHSA-vq5j-55vx-wq8j vendor-advisory related

    cna.erlef.org/cves/CVE-2026-32146.html related

    osv.dev/vulnerability/EEF-CVE-2026-32146 related

    github.com/…ommit/1aa5d8e594b0aa240bb213fce6ee19c65e6d5bcf patch

    github.com/…ommit/55bb36e6d7febfbbc48c4d001e0ae13eb0312d78 patch

    cve.org (CVE-2026-32146)

    nvd.nist.gov (CVE-2026-32146)

    Download JSON



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-210: (Pwn2Own) Samsung Galaxy S25 Samsung Members Security Feature Bypass Vulnerability
    Next Article CIS Helps Strengthen Cybersecurity in Energy & Utilities
    admin
    • Website

    Related Posts

    Alerts

    HPE security advisory (AV26-325) – Canadian Centre for Cyber Security

    April 11, 2026
    Alerts

    ZDI-26-210: (Pwn2Own) Samsung Galaxy S25 Samsung Members Security Feature Bypass Vulnerability

    April 11, 2026
    Alerts

    HPE security advisory (AV26-333) – Canadian Centre for Cyber Security

    April 11, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    HPE security advisory (AV26-325) – Canadian Centre for Cyber Security

    April 11, 2026

    CIS Helps Strengthen Cybersecurity in Energy & Utilities

    April 11, 2026

    CVE-2026-32146 | THREATINT

    April 11, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.