Description
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0.
Published: 2026-02-13
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file read and write across namespaces and sibling directories via path traversal in lakeFS local block adapter
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in lakeFS’s local block adapter where path validation uses a simple string prefix check, allowing legitimate users to open files outside their allocated storage directory. Attackers can use path traversal sequences or exploit similarly named sibling directories to read or modify data in other namespaces, compromising confidentiality and integrity of stored objects. This flaw is a classic absolute path traversal (CWE‑22).

Affected Systems

The issue affects installations of lakeFS produced by treeverse, specifically versions prior to 1.77.0. No version beyond 1.77.0 is vulnerable. Disaster remediation requires updating to v1.77.0 or later.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity flaw. However, the EPSS score of less than 1% suggests a very low current probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, implying no publicly known exploits yet. The attack requires an authenticated user and the ability to issue file read/write commands through the local block adapter, so it is moderately exploitable in environments with weak access controls or where the adapter is exposed to untrusted actors.

Generated by OpenCVE AI on April 17, 2026 at 19:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade lakeFS to version 1.77.0 or newer to receive the fix for the local block adapter path validation.
  • Modify lakeFS configuration to enforce stringent namespace separation and validate object identifiers against the correct namespace before performing any file operation.
  • Apply operating‑system level access controls or container isolation to restrict the file system paths that the lakeFS process can access, minimizing potential impact if the vulnerability is inadvertently exploited.

Generated by OpenCVE AI on April 17, 2026 at 19:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-699m-4v95-rmpm lakeFS vulnerable to path traversal in local block adapter allow cross-namespace and sibling directory access
History

Wed, 18 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Lakefs
Lakefs lakefs
CPEs cpe:2.3:a:lakefs:lakefs:*:*:*:*:*:*:*:*
Vendors & Products Lakefs
Lakefs lakefs

Sat, 14 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Treeverse
Treeverse lakefs
Vendors & Products Treeverse
Treeverse lakefs

Fri, 13 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Description lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0.
Title lakeFS vulnerable to path traversal in local block adapter allow cross-namespace and sibling directory access
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-13T19:53:32.197Z

Reserved: 2026-02-11T19:56:24.812Z

Link: CVE-2026-26187

cve-icon Vulnrichment

Updated: 2026-02-13T19:53:23.436Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-13T19:17:29.100

Modified: 2026-02-18T21:32:15.033

Link: CVE-2026-26187

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:00:09Z

Weaknesses