Path Traversal Vulnerability in uutils Coreutils Allows Bypass of Safety Mechanism
CVE-2026-35338

7.3HIGH

Key Information:

Vendor

Uutils

Status
Vendor
CVE Published:
22 April 2026

What is CVE-2026-35338?

A vulnerability in the chmod utility of uutils coreutils allows users to bypass the safety mechanism intended to preserve the root directory. Due to insufficient path validation, an attacker can leverage path variants like /../ or symbolic links to perform destructive operations recursively, such as changing permissions for the entire root filesystem. This misconfiguration can lead to widespread permission loss and could potentially compromise system functionality.

Affected Version(s)

coreutils Linux 0 < 0.6.0

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Zellic
.