Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23949: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaraco jaraco.context

0
High
VulnerabilityCVE-2026-23949cvecve-2026-23949cwe-22
Published: Tue Jan 20 2026 (01/20/2026, 00:36:23 UTC)
Source: CVE Database V5
Vendor/Project: jaraco
Product: jaraco.context

Description

CVE-2026-23949 is a high-severity path traversal vulnerability in the jaraco. context open-source package, affecting versions from 5. 2. 0 up to but not including 6. 1. 0. The flaw exists in the tarball extraction function, where maliciously crafted tar archives can cause files to be extracted outside the intended directory due to improper path sanitization. This includes nested tarballs that also carry traversal payloads. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of sensitive files. The vulnerability has a CVSS score of 8.

AI-Powered Analysis

AILast updated: 01/20/2026, 01:05:17 UTC

Technical Analysis

CVE-2026-23949 is a path traversal vulnerability classified under CWE-22 found in the jaraco.context Python package, specifically in the tarball() function introduced in version 5.2.0 and fixed in 6.1.0. The vulnerability arises because the strip_first_component filter, intended to sanitize extracted paths by removing the first directory component, fails to properly handle '../' sequences. For example, a path like 'dummy_dir/../../etc/passwd' is incorrectly normalized to '../../etc/passwd', allowing extraction outside the target directory. This flaw extends to nested tarballs where an inner archive contains traversal paths, enabling multi-level exploitation. The vulnerability allows an attacker to craft malicious tar archives that, when processed by vulnerable jaraco.context versions, extract files to arbitrary locations on the filesystem. This can lead to unauthorized disclosure of sensitive files, such as configuration files or credentials, without requiring any authentication or user interaction. The CVSS 3.1 base score is 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting network exploitable, low complexity, no privileges or user interaction needed, with a scope change and high confidentiality impact but no integrity or availability impact. No known exploits have been reported yet, but the vulnerability poses a significant risk to applications that process untrusted tar archives using jaraco.context. The issue was addressed in version 6.1.0 by correcting the path sanitization logic to prevent directory traversal during extraction.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive data if they use jaraco.context versions between 5.2.0 and 6.1.0 in applications that handle tarball extraction from untrusted sources. Attackers could exploit this flaw to extract files outside intended directories, potentially accessing critical configuration files, credentials, or other sensitive information stored on affected systems. This could lead to data breaches, compliance violations (e.g., GDPR), and reputational damage. Since the vulnerability does not affect integrity or availability, the primary concern is confidentiality loss. Industries such as finance, healthcare, government, and critical infrastructure in Europe that rely on Python-based applications incorporating jaraco.context are at higher risk. The lack of required authentication or user interaction increases the attack surface, especially for publicly accessible services or automated processing pipelines. Although no active exploitation is reported, the vulnerability's presence in open-source software widely used in development environments and production systems means that European organizations should act promptly to mitigate potential risks.

Mitigation Recommendations

European organizations should immediately audit their software dependencies to identify usage of jaraco.context versions >=5.2.0 and <6.1.0. They must upgrade all affected instances to version 6.1.0 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict input validation and sandboxing for tarball processing to prevent extraction outside designated directories. Employ runtime monitoring to detect anomalous file system writes during archive extraction. Additionally, review and restrict permissions of processes handling tarball extraction to minimize potential impact. Incorporate security scanning tools in CI/CD pipelines to detect vulnerable dependencies automatically. Educate developers about safe archive handling practices and the risks of path traversal in archive extraction. Finally, maintain up-to-date inventories of open-source components and apply security patches promptly to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ed1704623b1157cdcb267

Added to database: 1/20/2026, 12:50:56 AM

Last enriched: 1/20/2026, 1:05:17 AM

Last updated: 1/20/2026, 2:21:07 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats