Improper Path Validation in Gleam Compiler Affects File System Security
CVE-2026-32146
6.2MEDIUM
What is CVE-2026-32146?
An improper path validation vulnerability in the Gleam compiler allows an attacker to manipulate filesystem paths during the handling of git dependencies. This occurs when dependency names are integrated into filesystem paths without adequate validation, enabling potential exploitation through relative and absolute path traversal techniques. By leveraging malicious dependencies, an attacker may modify or delete directories beyond the intended scope, leading to data loss or even unauthorized code execution in certain configurations. Such vulnerabilities underscore the need for secure dependency management practices.
Affected Version(s)
Gleam 1.9.0-rc1
Gleam 1.9.0-rc1
Gleam a4fde22445ab8e5cc79c2ff48971616cb570702c
References
CVSS V4
Score:
6.2
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
John Downey
Louis Pilfold
Jonatan Männchen / EEF
