Impact
Compress::Raw::Zlib versions up to 2.219 bundle an old zlib library that contains multiple critical flaws uncovered in a recent security audit. The weaknesses are tied to improper handling of compressed data, allowing an attacker to craft malicious input that could trigger memory corruption, elevate privileges, or cause a crash. The associated weaknesses match CWE-1104 (Untrusted Input Processing), CWE-1284 (Incorrect Cryptographic Storage), and CWE-1395 (Improper Data Validation).
Affected Systems
The vulnerability affects the PMQS Compress::Raw::Zlib Perl module for any application that imports it. All releases through 2.219 are impacted; version 2.220 incorporates zlib 1.3.2, which addresses the documented issues and includes the fix for CVE-2026-27171.
Risk and Exploitability
The CVSS score of 9.8 indicates a high severity risk. The EPSS score is below 1 %, signifying a low but non‑zero likelihood that exploit code exist in the wild; the vulnerability is not listed in the CISA KEV catalog. The exposure is primarily through the module’s decompression routine—an attacker could supply malformed or specially crafted compressed data to trigger the underlying zlib bugs. Based on the description, the attack vector is inferred to be the handling of user‑supplied compressed streams in Perl applications that use this module.
OpenCVE Enrichment