Description
Arbitrary file write & potential privilege escalation exploiting zip slip vulnerability in Google Web Designer.
Published: 2026-02-27
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file write and privilege escalation.
Action: Patch ASAP
AI Analysis

Impact

A zip slip vulnerability in Google Web Designer allows an attacker to create a specially crafted zip file that, when extracted by the application, causes files outside the intended extraction directory to be overwritten. This flaw leads to arbitrary file write and can enable privilege escalation if the application runs with elevated privileges. The weakness is a typical path traversal issue, identified as CWE‑22.

Affected Systems

The affectation is scoped to Google Web Designer, specifically version 14.2.2.0 as indicated by the CPE string. No other releases are explicitly mentioned in the CVE data; therefore, only this version is confirmed as vulnerable.

Risk and Exploitability

The reported CVSS score of 8.4 signals high severity, whereas the EPSS score of less than 1% denotes a very low probability of exploitation at present. The vulnerability is not cataloged in CISA KEV. Based on the description, it is inferred that an attacker must provide a maliciously crafted zip file via the application's Import or Open function. When the user or the system extracts that file, the path traversal entry writes to arbitrary locations, provided that the executing context has write permission to those paths. No authentication or network exploitation prerequisites are stated, so the attack is likely local and independent of user credentials.

Generated by OpenCVE AI on April 18, 2026 at 10:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest update or patch released by Google for Web Designer to address the zip slip bug.
  • Disable or restrict the application's ability to import or open zip archives, or configure the import workflow to enforce safe extraction paths.
  • Limit file system permissions of the directories used by Web Designer to prevent the application from writing outside its intended area.

Generated by OpenCVE AI on April 18, 2026 at 10:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:google:web_designer:14.2.2.0:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google web Designer
Vendors & Products Google
Google web Designer

Fri, 27 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
Description Arbitrary file write & potential privilege escalation exploiting zip slip vulnerability in Google Web Designer.
Title Zip Slip leading to Arbitrary File Write and Privilege Escalation in Google Web Designer
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Google Web Designer
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2026-03-04T04:55:13.784Z

Reserved: 2026-02-25T18:46:35.171Z

Link: CVE-2026-3223

cve-icon Vulnrichment

Updated: 2026-02-27T14:37:50.992Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T14:16:30.923

Modified: 2026-04-14T00:33:21.800

Link: CVE-2026-3223

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:30:35Z

Weaknesses