#VU124119 Path traversal in Go programming language - CVE-2026-27139

 

#VU124119 Path traversal in Go programming language - CVE-2026-27139

Published: March 19, 2026


Vulnerability identifier: #VU124119
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-27139
CWE-ID: CWE-22
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Go programming language
Software vendor:
Google

Description

The vulnerability allows a local user to access file metadata outside the intended root directory.

The vulnerability exists due to improper handling of symbolic links in os.FileInfo when listing directory contents via File.ReadDir or File.Readdir on Unix platforms. A local user can replace a path component with a symbolic link to cause lstat to access a file outside the root, allowing metadata disclosure.

The impact is limited to reading file metadata such as size and existence; it does not allow reading or modifying file contents. The user must have access to the directory being listed and the ability to create or modify symbolic links within the path.


Remediation

Install security update from vendor's website.

External links