{"api_version":"1","generated_at":"2026-04-22T15:34:09+00:00","cve":"CVE-2026-27139","urls":{"html":"https://cve.report/CVE-2026-27139","api":"https://cve.report/api/cve/CVE-2026-27139.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-27139","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-27139"},"summary":{"title":"FileInfo can escape from a Root in os","description":"On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.","state":"PUBLISHED","assigner":"Go","published_at":"2026-03-06 22:16:01","updated_at":"2026-04-21 14:32:36"},"problem_types":["CWE-22","CWE-363: Race Condition Enabling Link Following"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"2.5","severity":"LOW","vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","data":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":2.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"2.5","severity":"LOW","vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":2.5,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"https://pkg.go.dev/vuln/GO-2026-4602","name":"https://pkg.go.dev/vuln/GO-2026-4602","refsource":"security@golang.org","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk","name":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk","refsource":"security@golang.org","tags":["Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://go.dev/cl/749480","name":"https://go.dev/cl/749480","refsource":"security@golang.org","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://go.dev/issue/77827","name":"https://go.dev/issue/77827","refsource":"security@golang.org","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-27139","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27139","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Go standard library","product":"os","version":"affected 1.25.8 semver","platforms":[]},{"source":"CNA","vendor":"Go standard library","product":"os","version":"affected 1.26.0-0 1.26.1 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Miloslav Trmač of Red Hat","lang":"en"}],"nvd_cpes":[{"cve_year":"2026","cve_id":"27139","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"go","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"27139","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"go","cpe6":"1.26.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"27139","cve":"CVE-2026-27139","epss":"0.000080000","percentile":"0.007160000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":2.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}},{"other":{"content":{"id":"CVE-2026-27139","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-09T14:53:55.467850Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-09T14:53:58.363Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"collectionURL":"https://pkg.go.dev","defaultStatus":"unaffected","packageName":"os","product":"os","programRoutines":[{"name":"File.ReadDir"},{"name":"File.Readdir"},{"name":"ReadDir"},{"name":"dirFS.ReadDir"},{"name":"rootFS.ReadDir"}],"vendor":"Go standard library","versions":[{"lessThan":"1.25.8","status":"affected","version":"0","versionType":"semver"},{"lessThan":"1.26.1","status":"affected","version":"1.26.0-0","versionType":"semver"}]}],"credits":[{"lang":"en","value":"Miloslav Trmač of Red Hat"}],"descriptions":[{"lang":"en","value":"On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root."}],"problemTypes":[{"descriptions":[{"description":"CWE-363: Race Condition Enabling Link Following","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-03-06T21:28:14.451Z","orgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","shortName":"Go"},"references":[{"url":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"},{"url":"https://go.dev/issue/77827"},{"url":"https://go.dev/cl/749480"},{"url":"https://pkg.go.dev/vuln/GO-2026-4602"}],"title":"FileInfo can escape from a Root in os"}},"cveMetadata":{"assignerOrgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","assignerShortName":"Go","cveId":"CVE-2026-27139","datePublished":"2026-03-06T21:28:14.451Z","dateReserved":"2026-02-17T19:57:28.435Z","dateUpdated":"2026-03-09T14:53:58.363Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-06 22:16:01","lastModifiedDate":"2026-04-21 14:32:36","problem_types":["CWE-22","CWE-363: Race Condition Enabling Link Following"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":2.5,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*","versionEndExcluding":"1.25.8","matchCriteriaId":"2D293CC0-B163-4E62-B985-52FB6ECA64C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:golang:go:1.26.0:*:*:*:*:*:*:*","matchCriteriaId":"A40FE3CB-0D03-462B-8A19-4DF1920ABE82"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"27139","Ordinal":"1","Title":"FileInfo can escape from a Root in os","CVE":"CVE-2026-27139","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"27139","Ordinal":"1","NoteData":"On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.","Type":"Description","Title":"FileInfo can escape from a Root in os"}]}}}