Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-35338
PUBLISHED
More InfoOfficial Page
Assigner-canonical
Assigner Org ID-cc1ad9ee-3454-478d-9317-d3e869d708bc
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 16:07
Updated At-24 Apr, 2026 | 03:55
Rejected At-
▼CVE Numbering Authority (CNA)
uutils coreutils chmod Path Traversal Bypass of --preserve-root

A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not canonicalize the path. An attacker or accidental user can use path variants such as /../ or symbolic links to execute destructive recursive operations (e.g., chmod -R 000) on the entire root filesystem, leading to system-wide permission loss and potential complete system breakdown.

Affected Products
Vendor
Uutils
Product
coreutils
Collection URL
https://github.com/uutils
Package Name
coreutils
Repo
https://github.com/uutils/coreutils
Platforms
  • Linux
  • Unix
  • macOS
Default Status
unaffected
Versions
Affected
  • From 0 before 0.6.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-22
Description: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-597CAPEC-597: Absolute Path Traversal
CAPEC ID: CAPEC-597
Description: CAPEC-597: Absolute Path Traversal
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Zellic
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/uutils/coreutils/pull/10033
patch
issue-tracking
https://github.com/uutils/coreutils/releases/tag/0.6.0
vendor-advisory
Hyperlink: https://github.com/uutils/coreutils/pull/10033
Resource:
patch
issue-tracking
Hyperlink: https://github.com/uutils/coreutils/releases/tag/0.6.0
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found