CVE-2026-27014: CWE-674: Uncontrolled Recursion in M2Team NanaZip
CVE-2026-27014 is a medium severity vulnerability in M2Team's NanaZip archive software versions 5. 0. 1252. 0 up to but not including 6. 0. 1630. 0. It arises from uncontrolled recursion caused by deeply nested directories and circular NextOffset chains in the ROMFS archive parser, leading to infinite loops or stack overflows. Exploitation requires local access with low privileges and some user interaction, such as opening a crafted archive file. The vulnerability can cause application crashes or denial of service but does not directly lead to code execution or data compromise.
AI Analysis
Technical Summary
CVE-2026-27014 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting the NanaZip open-source file archiving tool developed by M2Team. Specifically, the flaw exists in the ROMFS archive parser component of NanaZip versions starting from 5.0.1252.0 up to 6.0.1630.0. The vulnerability manifests when the parser encounters circular NextOffset chains within an archive or deeply nested directory structures. These conditions cause the parser to enter an infinite loop or trigger unbounded recursion, resulting in a stack overflow. This uncontrolled recursion can crash the application, leading to denial of service. The vulnerability requires low privileges (local access) and some user interaction, such as opening a maliciously crafted archive file. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector local, low attack complexity, no privileges required beyond low, and user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability beyond causing application crashes. No known exploits are reported in the wild as of the publication date. The issue was addressed and patched in NanaZip version 6.0.1630.0. Users of affected versions are advised to upgrade to the patched release to eliminate the risk.
Potential Impact
The primary impact of CVE-2026-27014 is denial of service due to application crashes caused by infinite loops or stack overflows when processing maliciously crafted ROMFS archives. For organizations, this can disrupt workflows that rely on NanaZip for archive extraction or management, potentially halting automated processes or user activities involving archive files. While the vulnerability does not allow remote code execution or data exfiltration, repeated exploitation could degrade system stability or availability, especially in environments where NanaZip is integrated into automated pipelines or used frequently by multiple users. The requirement for local access and user interaction limits the attack surface, but insider threats or phishing attacks delivering malicious archives could still exploit this flaw. Overall, the impact is moderate, affecting availability of the application but not leading to broader system compromise.
Mitigation Recommendations
To mitigate CVE-2026-27014, organizations should: 1) Upgrade NanaZip to version 6.0.1630.0 or later, where the vulnerability is patched. 2) Implement strict controls on archive files received from untrusted or unknown sources, including scanning and sandboxing before opening. 3) Educate users about the risks of opening archive files from suspicious emails or downloads to reduce the likelihood of user interaction with malicious files. 4) Where possible, restrict local user privileges to limit the ability to execute or open potentially harmful files. 5) Monitor application logs for crashes or unusual behavior related to archive processing that may indicate exploitation attempts. 6) Consider using alternative archive tools with robust security track records if NanaZip is not essential. These steps go beyond generic advice by focusing on patching, user awareness, and operational controls specific to archive handling.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, China
CVE-2026-27014: CWE-674: Uncontrolled Recursion in M2Team NanaZip
Description
CVE-2026-27014 is a medium severity vulnerability in M2Team's NanaZip archive software versions 5. 0. 1252. 0 up to but not including 6. 0. 1630. 0. It arises from uncontrolled recursion caused by deeply nested directories and circular NextOffset chains in the ROMFS archive parser, leading to infinite loops or stack overflows. Exploitation requires local access with low privileges and some user interaction, such as opening a crafted archive file. The vulnerability can cause application crashes or denial of service but does not directly lead to code execution or data compromise.
AI-Powered Analysis
Technical Analysis
CVE-2026-27014 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting the NanaZip open-source file archiving tool developed by M2Team. Specifically, the flaw exists in the ROMFS archive parser component of NanaZip versions starting from 5.0.1252.0 up to 6.0.1630.0. The vulnerability manifests when the parser encounters circular NextOffset chains within an archive or deeply nested directory structures. These conditions cause the parser to enter an infinite loop or trigger unbounded recursion, resulting in a stack overflow. This uncontrolled recursion can crash the application, leading to denial of service. The vulnerability requires low privileges (local access) and some user interaction, such as opening a maliciously crafted archive file. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector local, low attack complexity, no privileges required beyond low, and user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability beyond causing application crashes. No known exploits are reported in the wild as of the publication date. The issue was addressed and patched in NanaZip version 6.0.1630.0. Users of affected versions are advised to upgrade to the patched release to eliminate the risk.
Potential Impact
The primary impact of CVE-2026-27014 is denial of service due to application crashes caused by infinite loops or stack overflows when processing maliciously crafted ROMFS archives. For organizations, this can disrupt workflows that rely on NanaZip for archive extraction or management, potentially halting automated processes or user activities involving archive files. While the vulnerability does not allow remote code execution or data exfiltration, repeated exploitation could degrade system stability or availability, especially in environments where NanaZip is integrated into automated pipelines or used frequently by multiple users. The requirement for local access and user interaction limits the attack surface, but insider threats or phishing attacks delivering malicious archives could still exploit this flaw. Overall, the impact is moderate, affecting availability of the application but not leading to broader system compromise.
Mitigation Recommendations
To mitigate CVE-2026-27014, organizations should: 1) Upgrade NanaZip to version 6.0.1630.0 or later, where the vulnerability is patched. 2) Implement strict controls on archive files received from untrusted or unknown sources, including scanning and sandboxing before opening. 3) Educate users about the risks of opening archive files from suspicious emails or downloads to reduce the likelihood of user interaction with malicious files. 4) Where possible, restrict local user privileges to limit the ability to execute or open potentially harmful files. 5) Monitor application logs for crashes or unusual behavior related to archive processing that may indicate exploitation attempts. 6) Consider using alternative archive tools with robust security track records if NanaZip is not essential. These steps go beyond generic advice by focusing on patching, user awareness, and operational controls specific to archive handling.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T03:08:23.490Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699812af2c4d84f260aeb048
Added to database: 2/20/2026, 7:52:15 AM
Last enriched: 2/20/2026, 7:54:13 AM
Last updated: 2/20/2026, 12:17:37 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2486: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons For Elementor – White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-10970: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Kolay Software Inc. Talentics
CriticalCVE-2026-21620: CWE-23 Relative Path Traversal in erlang otp
LowChip Testing Giant Advantest Hit by Ransomware
MediumCVE-2026-26050: Uncontrolled Search Path Element in Ricoh Company, Ltd. ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.