Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radare
Radare radare2 |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Radare
Radare radare2 |
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory. | |
| Title | radare2 < 6.1.4 Project Notes Path Traversal via Symlink | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-24T16:39:32.649Z
Reserved: 2026-04-23T20:36:46.378Z
Link: CVE-2026-6941
Updated: 2026-04-24T16:39:28.395Z
Status : Analyzed
Published: 2026-04-23T21:16:06.790
Modified: 2026-04-27T14:57:19.727
Link: CVE-2026-6941
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:30:26Z