Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-5061

Summary
Assigner-HashiCorp
Assigner Org ID-67fedba0-ff2e-4543-ba5b-aa93e87718cc
Published At-12 May, 2026 | 13:58
Updated At-12 May, 2026 | 15:43
Rejected At-
Credits

Consul-template vulnerable to sandbox path bypass in file helper via a symlink attack

The consul-template library before version 0.42.0 is vulnerable to a sandbox path bypass in the file template helper that may allow reading an out-of-sandbox file. This vulnerability (CVE-2026-5061) is fixed in consul-template 0.42.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:HashiCorp
Assigner Org ID:67fedba0-ff2e-4543-ba5b-aa93e87718cc
Published At:12 May, 2026 | 13:58
Updated At:12 May, 2026 | 15:43
Rejected At:
▼CVE Numbering Authority (CNA)
Consul-template vulnerable to sandbox path bypass in file helper via a symlink attack

The consul-template library before version 0.42.0 is vulnerable to a sandbox path bypass in the file template helper that may allow reading an out-of-sandbox file. This vulnerability (CVE-2026-5061) is fixed in consul-template 0.42.0.

Affected Products
Vendor
HashiCorp, Inc.HashiCorp
Product
Tooling
Repo
https://github.com/hashicorp/consul-template
Platforms
  • 64 bit
  • 32 bit
  • x86
  • ARM
  • MacOS
  • Windows
  • Linux
Default Status
unaffected
Versions
Affected
  • From 0.1.0 before 0.42.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-59CWE-59: Improper Link Resolution Before File Access (Link Following)
Type: CWE
CWE ID: CWE-59
Description: CWE-59: Improper Link Resolution Before File Access (Link Following)
Metrics
VersionBase scoreBase severityVector
3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-132CAPEC-132: Symlink Attack
CAPEC ID: CAPEC-132
Description: CAPEC-132: Symlink Attack
Solutions

Configurations

Workarounds

Exploits

Credits

This issue was reported to HashiCorp by Mohamed Abdelaal (0xmrma).
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://discuss.hashicorp.com/t/hcsec-2026-12-consul-template-vulnerable-to-sandbox-path-bypass-in-file-helper-through-symlink-attack/77414
N/A
Hyperlink: https://discuss.hashicorp.com/t/hcsec-2026-12-consul-template-vulnerable-to-sandbox-path-bypass-in-file-helper-through-symlink-attack/77414
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@hashicorp.com
Published At:12 May, 2026 | 15:16
Updated At:12 May, 2026 | 15:16

The consul-template library before version 0.42.0 is vulnerable to a sandbox path bypass in the file template helper that may allow reading an out-of-sandbox file. This vulnerability (CVE-2026-5061) is fixed in consul-template 0.42.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-59Secondarysecurity@hashicorp.com
CWE ID: CWE-59
Type: Secondary
Source: security@hashicorp.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://discuss.hashicorp.com/t/hcsec-2026-12-consul-template-vulnerable-to-sandbox-path-bypass-in-file-helper-through-symlink-attack/77414security@hashicorp.com
N/A
Hyperlink: https://discuss.hashicorp.com/t/hcsec-2026-12-consul-template-vulnerable-to-sandbox-path-bypass-in-file-helper-through-symlink-attack/77414
Source: security@hashicorp.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

11Records found

CVE-2023-25000
Matching Score-8
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-8
Assigner-HashiCorp Inc.
CVSS Score-5||MEDIUM
EPSS-0.03% / 9.69%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 00:17
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vault Vulnerable to Cache-Timing Attacks During Seal and Unseal Operations

HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-vaultVault EnterpriseVault
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2026-2808
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 7.33%
||
7 Day CHG~0.00%
Published-11 Mar, 2026 | 23:08
Updated-17 Apr, 2026 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider

HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-ConsulConsul Enterprise
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2024-1329
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-7.7||HIGH
EPSS-0.33% / 56.23%
||
7 Day CHG~0.00%
Published-08 Feb, 2024 | 19:20
Updated-26 Sep, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nomad Vulnerable to Arbitrary Write Through Symlink Attack

HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. This vulnerability, CVE-2024-1329, is fixed in Nomad 1.7.4, 1.6.7, and 1.5.14.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-nomadNomadNomad Enterprise
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-610
Externally Controlled Reference to a Resource in Another Sphere
CVE-2026-8052
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-6||MEDIUM
EPSS-0.02% / 6.00%
||
7 Day CHG~0.00%
Published-12 May, 2026 | 19:09
Updated-12 May, 2026 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nomad's exec2 task driver vulnerable to arbitrary file read/write on client host through symlink attack

HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-8052) is fixed in version 0.1.2 of the exec2 task driver.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-Shared library
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2026-6959
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-6||MEDIUM
EPSS-0.01% / 0.59%
||
7 Day CHG~0.00%
Published-12 May, 2026 | 18:59
Updated-12 May, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nomad vulnerable to arbitrary file read/write on client host through symlink attack

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-NomadNomad Enterprise
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-8959
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.48%
||
7 Day CHG~0.00%
Published-15 Aug, 2025 | 20:32
Updated-11 Dec, 2025 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HashiCorp go-getter Vulnerable to Arbitrary Read through Symlink Attack

HashiCorp's go-getter library subdirectory download feature is vulnerable to symlink attacks leading to unauthorized read access beyond the designated directory boundaries. This vulnerability, identified as CVE-2025-8959, is fixed in go-getter 1.7.9.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-go-getterShared library
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-0377
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.54%
||
7 Day CHG~0.00%
Published-21 Jan, 2025 | 15:23
Updated-15 Dec, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HashiCorp go-slug Vulnerable to Zip Slip Attack

HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-go-slugShared library
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2023-5834
Matching Score-6
Assigner-HashiCorp Inc.
ShareView Details
Matching Score-6
Assigner-HashiCorp Inc.
CVSS Score-3.8||LOW
EPSS-0.08% / 24.13%
||
7 Day CHG~0.00%
Published-27 Oct, 2023 | 21:06
Updated-09 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vagrant’s Windows Installer Allowed Directory Junction Write

HashiCorp Vagrant's Windows installer targeted a custom location with a non-protected path that could be junctioned, introducing potential for unauthorized file system writes. Fixed in Vagrant 2.4.0.

Action-Not Available
Vendor-HashiCorp, Inc.
Product-vagrantVagrant
CWE ID-CWE-1386
Insecure Operation on Windows Junction / Mount Point
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2026-27456
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 4.41%
||
7 Day CHG~0.00%
Published-03 Apr, 2026 | 21:23
Updated-22 Apr, 2026 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup

util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.

Action-Not Available
Vendor-util-linuxLinux Kernel Organization, Inc
Product-util-linuxutil-linux
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2026-35359
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 4.30%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 16:08
Updated-24 Apr, 2026 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
uutils coreutils cp Information Disclosure via Time-of-Check to Time-of-Use Symlink Swap

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with concurrent write access can swap a regular file for a symbolic link during this window, causing a privileged cp process to copy the contents of arbitrary sensitive files into a destination controlled by the attacker.

Action-Not Available
Vendor-uutilsUutils
Product-coreutilscoreutils
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-41421
Matching Score-4
Assigner-TeamViewer Germany GmbH
ShareView Details
Matching Score-4
Assigner-TeamViewer Germany GmbH
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 4.75%
||
7 Day CHG~0.00%
Published-01 Oct, 2025 | 13:48
Updated-02 Oct, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation via Symbolic Link Spoofing in TeamViewer Client

Improper handling of symbolic links in the TeamViewer Full Client and Host for Windows — in versions prior to 15.70 of TeamViewer Remote and Tensor — allows an attacker with local, unprivileged access to a device lacking adequate malware protection to escalate privileges by spoofing the update file path. This may result in unauthorized access to sensitive information.

Action-Not Available
Vendor-TeamViewer
Product-HostFull Client
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
Details not found