Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j273-m5qq-6825 | Junrar has an arbitrary file write due to backslash Path Traversal bypass in LocalFolderExtractor on Linux/Unix |
Mon, 02 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 28 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Junrar Project
Junrar Project junrar |
|
| CPEs | cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Junrar Project
Junrar Project junrar |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Junrar
Junrar junrar |
|
| Vendors & Products |
Junrar
Junrar junrar |
Thu, 26 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue. | |
| Title | Junrar has arbitrary file write due to backslash path traversal bypass in LocalFolderExtractor on Linux/Unix | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-02T20:47:15.670Z
Reserved: 2026-02-25T15:28:40.648Z
Link: CVE-2026-28208
Updated: 2026-03-02T20:47:04.767Z
Status : Modified
Published: 2026-02-26T23:16:35.440
Modified: 2026-03-02T21:16:27.533
Link: CVE-2026-28208
OpenCVE Enrichment
Updated: 2026-04-16T16:00:13Z
Github GHSA