Description
OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privileges.
Published: 2026-03-03
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Patch Immediately
AI Analysis

Impact

OpenViking processes .ovpack files by extracting ZIP archives into a target directory. In versions 0.2.1 and earlier the implementation fails to sanitize archive member names, allowing a malicious ZIP to include traversal sequences, absolute paths, or drive prefixes. When the import routine extracts such entries, it can write files outside the intended import directory, potentially overwriting or creating any file the importing process can access, which may include configuration files or executables. This flaw enables an attacker to influence the integrity and availability of the system, and if the import runs with elevated privileges, to compromise the whole system.

Affected Systems

The vulnerability affects the Volcengine OpenViking product, specifically versions 0.2.1 and all earlier releases.

Risk and Exploitability

The flaw carries a CVSS score of 8.4, indicating high severity. The EPSS score is less than 1%, suggesting that exploitation is currently rare but still possible. It is not listed in the CISA Known Exploited Vulnerabilities catalog, but the attack vector—uploading a malicious .ovpack—can be performed in environments where users can import packages. A successful exploit would allow an attacker to write arbitrary files with the privileges of the importing process, which may include root or system-level rights.

Generated by OpenCVE AI on April 16, 2026 at 05:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security fix from commit 46b3e76 or upgrade to a later OpenViking release that includes the patch.
  • Restrict who can perform .ovpack imports by limiting user permissions or disabling the import feature for untrusted entities.
  • Implement monitoring to alert on file changes outside the expected import directory to detect potential abuse.

Generated by OpenCVE AI on April 16, 2026 at 05:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rpqr-j937-6qr9 OpenViking contains a Path Traversal vulnerability
History

Fri, 17 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:volcengine:openviking:*:*:*:*:*:*:*:*

Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Volcengine
Volcengine openviking
Vendors & Products Volcengine
Volcengine openviking

Tue, 03 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 03 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privileges.
Title OpenViking .ovpack Import ZIP Slip Path Traversal
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Volcengine Openviking
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-31T20:44:01.330Z

Reserved: 2026-02-27T21:07:55.466Z

Link: CVE-2026-28518

cve-icon Vulnrichment

Updated: 2026-03-03T21:29:10.788Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-03T15:16:20.593

Modified: 2026-04-17T21:19:50.927

Link: CVE-2026-28518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:00:10Z

Weaknesses