Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 04 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zed
Zed zed |
|
| CPEs | cpe:2.3:a:zed:zed:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zed
Zed zed |
Fri, 27 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zed-industries
Zed-industries zed |
|
| Vendors & Products |
Zed-industries
Zed-industries zed |
Wed, 25 Feb 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zed, a code editor, has a Zip Slip (Path Traversal) vulnerability exists in its extension archive extraction functionality prior to version 0.224.4. The `extract_zip()` function in `crates/util/src/archive.rs` fails to validate ZIP entry filenames for path traversal sequences (e.g., `../`). This allows a malicious extension to write files outside its designated sandbox directory by downloading and extracting a crafted ZIP archive. Version 0.224.4 fixes the issue. | |
| Title | Zed has Zip Slip Path Traversal in Extension Archive Extraction | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T17:04:50.704Z
Reserved: 2026-02-24T02:31:33.266Z
Link: CVE-2026-27800
Updated: 2026-02-26T17:04:45.432Z
Status : Analyzed
Published: 2026-02-26T00:16:25.590
Modified: 2026-03-04T03:16:37.217
Link: CVE-2026-27800
No data.
OpenCVE Enrichment
Updated: 2026-04-18T10:45:43Z