CVE-2026-27211External Control of File Name or Path in Cloud Hypervisor

Severity
9.1CRITICALNVD
EPSS
0.1%
top 83.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
Latest updateFeb 10
PublishedFeb 21

Description

Cloud Hypervisor is a Virtual Machine Monitor for Cloud workloads. Versions 34.0 through 50.0 arevulnerable to arbitrary host file exfiltration (constrained by process privileges) when using virtio-block devices backed by raw images. A malicious guest can overwrite its disk header with a crafted QCOW2 structure pointing to a sensitive host path. Upon the next VM boot or disk scan, the image format auto-detection parses this header and serves the host file's contents to the guest. Guest-initiated

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H

Patches

📋Vendor Advisories

1
Microsoft
Cloud Hypervisor: Host File Exfiltration via QCOW Backing File Abuse2026-02-10

🕵️Threat Intelligence

1
Wiz
CVE-2026-27211 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-27211 — External Control of File Name or Path | cvebase