Description
The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.
Published: 2026-01-22
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write via Unvalidated Pathnames
Action: Immediate Patch
AI Analysis

Impact

ArchiveReader.extractContents() is used by cctl image load and container image load to unpack archives. The function performs no pathname validation before extracting an archive member, allowing a maliciously constructed archive to write a file to any user‑writable location on the system via relative pathnames. This results in an arbitrary file write vulnerability, classified as CWE‑22. The impact is the potential modification or insertion of files on the host filesystem, which can compromise confidentiality, integrity, or availability of the system.

Affected Systems

Apple Container and Apple Containerization products are affected. The fix was released in version 0.8.0 of Apple Container and version 0.21.0 of Apple Containerization. All earlier releases remain vulnerable.

Risk and Exploitability

The CVSS base score is 7.8, indicating a high level of severity. The EPSS score is reported as less than 1%, suggesting a very low probability of exploitation at the time of this assessment, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, where an adversary with access to run cctl image load can supply a crafted archive. No remote exploitation path is detailed in the provided data, but the vulnerability would still allow an attacker to overwrite arbitrary files if the image load process is executed with elevated or write‑capable privileges.

Generated by OpenCVE AI on April 18, 2026 at 03:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apple Container to version 0.8.0 or later.
  • Upgrade Apple Containerization to version 0.21.0 or later.
  • Ensure that only trusted images are loaded and restrict the execution of cctl image load to users with minimal privileges.

Generated by OpenCVE AI on April 18, 2026 at 03:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cq3j-qj2h-6rv3 Container and Containerization archive extraction does not guard against escapes from extraction base directory.
History

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apple:container:*:*:*:*:*:swift:*:*
cpe:2.3:a:apple:containerization:*:*:*:*:*:swift:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple container
Apple containerization
Vendors & Products Apple
Apple container
Apple containerization

Fri, 23 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Description The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.
References

Subscriptions

Apple Container Containerization
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-01-23T14:56:14.929Z

Reserved: 2025-11-11T14:43:07.858Z

Link: CVE-2026-20613

cve-icon Vulnrichment

Updated: 2026-01-23T14:53:34.718Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T00:15:52.283

Modified: 2026-01-27T20:17:18.463

Link: CVE-2026-20613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:30:25Z

Weaknesses