Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vchc-9ggh-3236 | uutils coreutils has a Path Traversal issue |
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/9749 |
|
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the rm utility of uutils coreutils allows the bypass of safeguard mechanisms intended to protect the current directory. While the utility correctly refuses to delete . or .., it fails to recognize equivalent paths with trailing slashes, such as ./ or .///. An accidental or malicious execution of rm -rf ./ results in the silent recursive deletion of all contents within the current directory. The command further obscures the data loss by reporting a misleading 'Invalid input' error, which may cause users to miss the critical window for data recovery. | |
| Title | uutils coreutils rm Safeguard Bypass via Improper Path Normalization | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:24:11.243Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35363
Updated: 2026-04-22T17:24:08.174Z
Status : Analyzed
Published: 2026-04-22T17:16:39.120
Modified: 2026-04-24T19:02:00.463
Link: CVE-2026-35363
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:54:18Z
Github GHSA