Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashicorp
Hashicorp consul Template |
|
| Vendors & Products |
Hashicorp
Hashicorp consul Template |
Tue, 12 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The consul-template library before version 0.42.0 is vulnerable to a sandbox path bypass in the file template helper that may allow reading an out-of-sandbox file. This vulnerability (CVE-2026-5061) is fixed in consul-template 0.42.0. | |
| Title | Consul-template vulnerable to sandbox path bypass in file helper via a symlink attack | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2026-05-12T15:43:01.985Z
Reserved: 2026-03-27T18:27:28.875Z
Link: CVE-2026-5061
Updated: 2026-05-12T15:42:58.140Z
Status : Deferred
Published: 2026-05-12T15:16:16.343
Modified: 2026-05-13T15:53:17.173
Link: CVE-2026-5061
No data.
OpenCVE Enrichment
Updated: 2026-05-12T17:00:10Z