Description
radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.
Published: 2026-04-23
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal
Action: Patch
AI Analysis

Impact

A path traversal flaw exists in radare2 before version 6.1.4 that allows an attacker to read or write files outside the project directory by importing a specially crafted .zrp archive containing a symlinked notes.txt file. The flaw is a classic example of a CWE‑22 path traversal combined with a CWE‑59 relative path escape vulnerability. Attackers can bypass the directory confinement checks that radare2 normally applies to project notes, enabling them to access arbitrary files on the host file system. This capability can lead to information disclosure or unauthorized modification of data, but it does not provide direct code execution privileges.

Affected Systems

The vulnerability affects all installations of radare2 from the start-up to version 6.1.3. The affected product is radare2 from radareorg. Users running these versions should apply the available update that releases version 6.1.4 or later, which removes the directory confinement checks for imported project notes.

Risk and Exploitability

The CVSS base score is 6.9, indicating a high severity due to the potential to read or alter critical files. The EPSS score is less than 1%, suggesting a low probability of widespread exploitation at present, and it is not listed in CISA’s KEV catalog. The likely attack vector involves an attacker delivering a malicious .zrp archive to a radare2 instance, either locally or through an interface that accepts uploads; precise exploitation requires control over the import of the archive. The vulnerability could therefore be leveraged by local users or remote users with the ability to submit .zrp files for processing.

Generated by OpenCVE AI on April 28, 2026 at 07:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade radare2 to version 6.1.4 or later, which removes the path traversal flaw in project notes handling.
  • Limit the creation and import of .zrp archives to trusted users or secure environments, and validate the archive contents before processing.
  • If an upgrade is not immediately feasible, disable or sanitize symlink handling in the notes import mechanism by removing symlinks from imported notes or rejecting archives that contain them.

Generated by OpenCVE AI on April 28, 2026 at 07:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Radare
Radare radare2
Weaknesses CWE-22
CPEs cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
Vendors & Products Radare
Radare radare2

Fri, 24 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.
Title radare2 < 6.1.4 Project Notes Path Traversal via Symlink
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T16:39:32.649Z

Reserved: 2026-04-23T20:36:46.378Z

Link: CVE-2026-6941

cve-icon Vulnrichment

Updated: 2026-04-24T16:39:28.395Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T21:16:06.790

Modified: 2026-04-27T14:57:19.727

Link: CVE-2026-6941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:30:26Z

Weaknesses