Description
SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.
Published:
2026-04-08
Score:
n/a
EPSS:
n/a
KEV:
No
Impact:
n/a
Action:
n/a
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 08 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass. | |
| Title | Code execution vulnerability in SWIG code generation in cmd/go | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-04-08T01:06:57.893Z
Reserved: 2026-02-17T19:57:28.435Z
Link: CVE-2026-27140
No data.
Status : Received
Published: 2026-04-08T02:16:02.887
Modified: 2026-04-08T02:16:02.887
Link: CVE-2026-27140
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.