Description
A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not canonicalize the path. An attacker or accidental user can use path variants such as /../ or symbolic links to execute destructive recursive operations (e.g., chmod -R 000) on the entire root filesystem, leading to system-wide permission loss and potential complete system breakdown.
Published: 2026-04-22
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: System-wide Permission Loss
Action: Apply Patch
AI Analysis

Impact

The chmod utility in uutils coreutils validates only when the target path equals exactly "/", and does not canonicalize the path. This allows an attacker to use path variants such as "/../" or symbolic links to bypass the --preserve-root safety mechanism. By exploiting this flaw, an attacker can execute destructive recursive operations—for example, running chmod -R 000 on the entire root filesystem—leading to a loss of permissions across critical system files and a potential complete system breakdown. The vulnerability exposes a classic pathname traversal weakness (CWE‑22) that directly undermines file system integrity and availability.

Affected Systems

The affected product is Uutils coreutils. The vulnerability exists in versions prior to the 0.6.0 release, which was announced in a GitHub pull request and release tag. Users employing earlier versions of the chmod binary in this project are at risk.

Risk and Exploitability

The CVSS score of 7.3 highlights a high severity rating, indicating that the flaw can cause significant damage when exploited. Although a current EPSS score is not available, the lack of a KEV listing suggests no widespread exploitation has been reported at this time. Based on the description, the attack vector is local; an attacker or even an accidental user with access to the filesystem and the ability to invoke chmod can craft a path that triggers the bypass. The exploit requires minimal prerequisites beyond the presence of the vulnerable binary, making it relatively straightforward to use.

Generated by OpenCVE AI on April 27, 2026 at 08:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update uutils coreutils to version 0.6.0 or later, which addresses the path traversal bypass in chmod.
  • If an immediate update is not possible, restrict the usage of the chmod binary by removing user execution permissions or placing the binary in a protected location that is not reachable via path variants.
  • Consider configuring stricter filesystem controls such as ACLs or chroot environments to limit the scope of destructive permission changes and to enforce the intended --preserve-root behavior.

Generated by OpenCVE AI on April 27, 2026 at 08:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9gqx-53gp-c8g3 uutils coreutils allows users to bypass the --preserve-root safety mechanism
History

Mon, 27 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Uutils
Uutils coreutils
CPEs cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:*
Vendors & Products Uutils
Uutils coreutils

Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not canonicalize the path. An attacker or accidental user can use path variants such as /../ or symbolic links to execute destructive recursive operations (e.g., chmod -R 000) on the entire root filesystem, leading to system-wide permission loss and potential complete system breakdown.
Title uutils coreutils chmod Path Traversal Bypass of --preserve-root
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Uutils Coreutils
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-24T03:55:21.897Z

Reserved: 2026-04-02T12:58:56.086Z

Link: CVE-2026-35338

cve-icon Vulnrichment

Updated: 2026-04-22T18:10:09.316Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T17:16:35.583

Modified: 2026-04-27T12:28:50.307

Link: CVE-2026-35338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T19:54:50Z

Weaknesses