CVE-2026-23949: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaraco jaraco.context
CVE-2026-23949 is a high-severity path traversal vulnerability in the jaraco. context open-source package, affecting versions from 5. 2. 0 up to but not including 6. 1. 0. The flaw exists in the tarball extraction function, where maliciously crafted tar archives can cause files to be extracted outside the intended directory due to improper path sanitization. This includes nested tarballs that also carry traversal payloads. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of sensitive files. The vulnerability has a CVSS score of 8.
AI Analysis
Technical Summary
CVE-2026-23949 is a path traversal vulnerability classified under CWE-22 found in the jaraco.context Python package, specifically in the tarball() function introduced in version 5.2.0 and fixed in 6.1.0. The vulnerability arises because the strip_first_component filter, intended to sanitize extracted paths by removing the first directory component, fails to properly handle '../' sequences. For example, a path like 'dummy_dir/../../etc/passwd' is incorrectly normalized to '../../etc/passwd', allowing extraction outside the target directory. This flaw extends to nested tarballs where an inner archive contains traversal paths, enabling multi-level exploitation. The vulnerability allows an attacker to craft malicious tar archives that, when processed by vulnerable jaraco.context versions, extract files to arbitrary locations on the filesystem. This can lead to unauthorized disclosure of sensitive files, such as configuration files or credentials, without requiring any authentication or user interaction. The CVSS 3.1 base score is 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting network exploitable, low complexity, no privileges or user interaction needed, with a scope change and high confidentiality impact but no integrity or availability impact. No known exploits have been reported yet, but the vulnerability poses a significant risk to applications that process untrusted tar archives using jaraco.context. The issue was addressed in version 6.1.0 by correcting the path sanitization logic to prevent directory traversal during extraction.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive data if they use jaraco.context versions between 5.2.0 and 6.1.0 in applications that handle tarball extraction from untrusted sources. Attackers could exploit this flaw to extract files outside intended directories, potentially accessing critical configuration files, credentials, or other sensitive information stored on affected systems. This could lead to data breaches, compliance violations (e.g., GDPR), and reputational damage. Since the vulnerability does not affect integrity or availability, the primary concern is confidentiality loss. Industries such as finance, healthcare, government, and critical infrastructure in Europe that rely on Python-based applications incorporating jaraco.context are at higher risk. The lack of required authentication or user interaction increases the attack surface, especially for publicly accessible services or automated processing pipelines. Although no active exploitation is reported, the vulnerability's presence in open-source software widely used in development environments and production systems means that European organizations should act promptly to mitigate potential risks.
Mitigation Recommendations
European organizations should immediately audit their software dependencies to identify usage of jaraco.context versions >=5.2.0 and <6.1.0. They must upgrade all affected instances to version 6.1.0 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict input validation and sandboxing for tarball processing to prevent extraction outside designated directories. Employ runtime monitoring to detect anomalous file system writes during archive extraction. Additionally, review and restrict permissions of processes handling tarball extraction to minimize potential impact. Incorporate security scanning tools in CI/CD pipelines to detect vulnerable dependencies automatically. Educate developers about safe archive handling practices and the risks of path traversal in archive extraction. Finally, maintain up-to-date inventories of open-source components and apply security patches promptly to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2026-23949: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaraco jaraco.context
Description
CVE-2026-23949 is a high-severity path traversal vulnerability in the jaraco. context open-source package, affecting versions from 5. 2. 0 up to but not including 6. 1. 0. The flaw exists in the tarball extraction function, where maliciously crafted tar archives can cause files to be extracted outside the intended directory due to improper path sanitization. This includes nested tarballs that also carry traversal payloads. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of sensitive files. The vulnerability has a CVSS score of 8.
AI-Powered Analysis
Technical Analysis
CVE-2026-23949 is a path traversal vulnerability classified under CWE-22 found in the jaraco.context Python package, specifically in the tarball() function introduced in version 5.2.0 and fixed in 6.1.0. The vulnerability arises because the strip_first_component filter, intended to sanitize extracted paths by removing the first directory component, fails to properly handle '../' sequences. For example, a path like 'dummy_dir/../../etc/passwd' is incorrectly normalized to '../../etc/passwd', allowing extraction outside the target directory. This flaw extends to nested tarballs where an inner archive contains traversal paths, enabling multi-level exploitation. The vulnerability allows an attacker to craft malicious tar archives that, when processed by vulnerable jaraco.context versions, extract files to arbitrary locations on the filesystem. This can lead to unauthorized disclosure of sensitive files, such as configuration files or credentials, without requiring any authentication or user interaction. The CVSS 3.1 base score is 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting network exploitable, low complexity, no privileges or user interaction needed, with a scope change and high confidentiality impact but no integrity or availability impact. No known exploits have been reported yet, but the vulnerability poses a significant risk to applications that process untrusted tar archives using jaraco.context. The issue was addressed in version 6.1.0 by correcting the path sanitization logic to prevent directory traversal during extraction.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive data if they use jaraco.context versions between 5.2.0 and 6.1.0 in applications that handle tarball extraction from untrusted sources. Attackers could exploit this flaw to extract files outside intended directories, potentially accessing critical configuration files, credentials, or other sensitive information stored on affected systems. This could lead to data breaches, compliance violations (e.g., GDPR), and reputational damage. Since the vulnerability does not affect integrity or availability, the primary concern is confidentiality loss. Industries such as finance, healthcare, government, and critical infrastructure in Europe that rely on Python-based applications incorporating jaraco.context are at higher risk. The lack of required authentication or user interaction increases the attack surface, especially for publicly accessible services or automated processing pipelines. Although no active exploitation is reported, the vulnerability's presence in open-source software widely used in development environments and production systems means that European organizations should act promptly to mitigate potential risks.
Mitigation Recommendations
European organizations should immediately audit their software dependencies to identify usage of jaraco.context versions >=5.2.0 and <6.1.0. They must upgrade all affected instances to version 6.1.0 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict input validation and sandboxing for tarball processing to prevent extraction outside designated directories. Employ runtime monitoring to detect anomalous file system writes during archive extraction. Additionally, review and restrict permissions of processes handling tarball extraction to minimize potential impact. Incorporate security scanning tools in CI/CD pipelines to detect vulnerable dependencies automatically. Educate developers about safe archive handling practices and the risks of path traversal in archive extraction. Finally, maintain up-to-date inventories of open-source components and apply security patches promptly to reduce exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T14:49:06.312Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696ed1704623b1157cdcb267
Added to database: 1/20/2026, 12:50:56 AM
Last enriched: 1/20/2026, 1:05:17 AM
Last updated: 1/20/2026, 2:21:07 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1051: CWE-352 Cross-Site Request Forgery (CSRF) in satollo Newsletter – Send awesome emails from WordPress
MediumCVE-2025-14978: CWE-862 Missing Authorization in peachpay PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net)
MediumCVE-2026-23950: CWE-176: Improper Handling of Unicode Encoding in isaacs node-tar
HighCVE-2026-1203: Improper Authentication in CRMEB
MediumCVE-2026-1202: Improper Authentication in CRMEB
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.