Description
Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destination directory, enabling arbitrary file read or write on the system processing the package. This issue has been patched in version 0.73.1.
Published: 2026-03-06
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file read or write via symlink exploitation
Action: Patch Now
AI Analysis

Impact

This vulnerability arises when Zarf extracts archives from a package. A crafted package can create symbolic links that point to paths outside the intended destination directory. The result is that the system executing the extraction can read or overwrite arbitrary files on the host filesystem, potentially compromising confidentiality, integrity, or availability of critical data.

Affected Systems

Zarf (zarf-dev:zarf) is affected in all releases from version 0.54.0 up to, but not including, 0.73.1. The issue is fixed in 0.73.1 and later versions.

Risk and Exploitability

The CVSS score is 8.2, indicating high severity. However, the EPSS score is less than 1 %, suggesting that current exploitation likelihood is low. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is inferred to be local: an attacker who can supply a package to a system running Zarf can trigger the path traversal. Proper version control and package integrity checks would mitigate the risk.

Generated by OpenCVE AI on April 16, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Zarf to version 0.73.1 or later to apply the official fix.
  • If an upgrade is not immediately possible, restrict execution of Zarf to trusted users only and ensure it processes packages only from authenticated sources.
  • Modify or audit the archive‑extraction logic to reject or resolve symbolic links that resolve outside the intended destination directory before writing files.

Generated by OpenCVE AI on April 16, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hcm4-6hpj-vghm Zarf's symlink targets in archives are not validated against destination directory
History

Wed, 11 Mar 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Lfprojects
Lfprojects zarf
CPEs cpe:2.3:a:lfprojects:zarf:*:*:*:*:*:*:*:*
Vendors & Products Lfprojects
Lfprojects zarf

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Zarf-dev
Zarf-dev zarf
Vendors & Products Zarf-dev
Zarf-dev zarf

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destination directory, enabling arbitrary file read or write on the system processing the package. This issue has been patched in version 0.73.1.
Title Zarf: Symlink targets in archives are not validated against destination directory
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T19:33:38.362Z

Reserved: 2026-03-03T20:51:43.482Z

Link: CVE-2026-29064

cve-icon Vulnrichment

Updated: 2026-03-06T19:31:14.526Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T17:16:34.003

Modified: 2026-03-11T00:28:49.547

Link: CVE-2026-29064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:30:15Z

Weaknesses