CVE-2026-26157External Control of File Name or Path in Busybox

Severity
7.0HIGHNVD
EPSS
0.0%
top 99.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 11

Description

A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages2 packages

debiandebian/busybox< busybox 1:1.37.0-10.1 (forky)
Debianbusybox/busybox< 1:1.37.0-10.1

🔴Vulnerability Details

2
OSV
CVE-2026-26157: A flaw was found in BusyBox2026-02-11
GHSA
GHSA-xm63-5pjx-vrhp: A flaw was found in BusyBox2026-02-11

📋Vendor Advisories

2
Red Hat
busybox: BusyBox: Arbitrary file overwrite and potential code execution via incomplete path sanitization2026-02-11
Debian
CVE-2026-26157: busybox - A flaw was found in BusyBox. Incomplete path sanitization in its archive extract...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-26157 Impact, Exploitability, and Mitigation Steps | Wiz