Impact
The vulnerability allows a local attacker to supply an absolute file path that escapes the configured projects directory and causes radare2 to delete arbitrary folders. This path traversal flaw (CWE‑22) results in unintended deletion of files owned by the radare2 process, causing loss of data integrity and service availability.
Affected Systems
radareorg:radare2 for all releases older than 6.1.4. No specific patch version list is provided, but any installation using radare2 before update 6.1.4 is affected.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate to high severity. The EPSS score of less than 1% suggests a very low probability of observed exploitation. The vulnerability is not included in CISA's KEV catalog. The attack vector is local, requiring the attacker to be able to run radare2 or invoke the project deletion operation. No network or remote exploitation path is described.
OpenCVE Enrichment