Description
Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification.

We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Published: 2026-04-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file write via directory traversal
Action: Patch Immediately
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon tough
Amazon tuftool
CPEs cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:*
cpe:2.3:a:amazon:tuftool:*:*:*:*:*:rust:*:*
Vendors & Products Amazon
Amazon tough
Amazon tuftool

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Aws
Aws tough
Aws tuftool
Vendors & Products Aws
Aws tough
Aws tuftool

Fri, 24 Apr 2026 20:30:00 +0000


Fri, 24 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Title Multiple Path Traversal Variants in awslabs/tough
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-24T20:10:00.800Z

Reserved: 2026-04-24T16:15:48.228Z

Link: CVE-2026-6968

cve-icon Vulnrichment

Updated: 2026-04-24T20:09:42.942Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T20:16:29.170

Modified: 2026-05-06T15:36:48.853

Link: CVE-2026-6968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:00:19Z

Weaknesses