Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ffj4-jq7m-9g6v | GuardDog Zip Bomb Vulnerability in safe_extract() Allows DoS |
Wed, 21 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:datadoghq:guarddog:*:*:*:*:*:python:*:* | |
| Metrics |
cvssV3_1
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datadoghq
Datadoghq guarddog |
|
| Vendors & Products |
Datadoghq
Datadoghq guarddog |
Tue, 13 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GuardDog is a CLI tool to identify malicious PyPI packages. Prior to 2.7.1, GuardDog's safe_extract() function does not validate decompressed file sizes when extracting ZIP archives (wheels, eggs), allowing attackers to cause denial of service through zip bombs. A malicious package can consume gigabytes of disk space from a few megabytes of compressed data. This vulnerability is fixed in 2.7.1. | |
| Title | GuardDog Zip Bomb Vulnerability in safe_extract() Allows DoS | |
| Weaknesses | CWE-409 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-13T21:23:53.024Z
Reserved: 2026-01-12T16:20:16.747Z
Link: CVE-2026-22870
Updated: 2026-01-13T21:23:49.022Z
Status : Analyzed
Published: 2026-01-13T21:15:55.067
Modified: 2026-01-21T18:47:48.963
Link: CVE-2026-22870
No data.
OpenCVE Enrichment
Updated: 2026-04-18T06:30:25Z
Github GHSA