Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-27117
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-24 Feb, 2026 | 22:16
Updated At-25 Feb, 2026 | 20:29

bit7z is a cross-platform C++ static library that allows the compression/extraction of archive files. Prior to version 4.0.11, a path traversal vulnerability ("Zip Slip") exists in bit7z's archive extraction functionality. The library does not adequately validate file paths contained in archive entries, allowing files to be written outside the intended extraction directory through three distinct mechanisms: relative path traversal, absolute path traversal, and symbolic link traversal. An attacker can exploit this by providing a malicious archive to any application that uses bit7z to extract untrusted archives. Successful exploitation results in arbitrary file write with the privileges of the process performing the extraction. This could lead to overwriting of application binaries, configuration files, or other sensitive data. The vulnerability does not directly enable reading of file contents; the confidentiality impact is limited to the calling application's own behavior after extraction. However, applications that subsequently serve or display extracted files may face secondary confidentiality risks from attacker-created symlinks. Fixes have been released in version 4.0.11. If upgrading is not immediately possible, users can mitigate the vulnerability by validating each entry's destination path before writing. Other mitigations include running extraction with least privilege and extracting untrusted archives in a sandboxed directory.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CPE Matches

rikyoz
rikyoz
>>bit7z>>Versions before 4.0.11(exclusive)
cpe:2.3:a:rikyoz:bit7z:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarysecurity-advisories@github.com
CWE-23Primarysecurity-advisories@github.com
CWE-36Primarysecurity-advisories@github.com
CWE-22Primarynvd@nist.gov
CWE ID: CWE-22
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-23
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-36
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/rikyoz/bit7z/commit/31763da9a3e41a199c141c8d71f6c11de24b45cfsecurity-advisories@github.com
Patch
https://github.com/rikyoz/bit7z/commit/9e020483eefa5825ec9310b1d869933d4f77f969security-advisories@github.com
Patch
https://github.com/rikyoz/bit7z/releases/tag/v4.0.11security-advisories@github.com
Release Notes
https://github.com/rikyoz/bit7z/security/advisories/GHSA-qvjh-hhw4-3gx9security-advisories@github.com
Exploit
Vendor Advisory
Hyperlink: https://github.com/rikyoz/bit7z/commit/31763da9a3e41a199c141c8d71f6c11de24b45cf
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/rikyoz/bit7z/commit/9e020483eefa5825ec9310b1d869933d4f77f969
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/rikyoz/bit7z/releases/tag/v4.0.11
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/rikyoz/bit7z/security/advisories/GHSA-qvjh-hhw4-3gx9
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found