Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27800: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zed-industries zed

0
High
VulnerabilityCVE-2026-27800cvecve-2026-27800cwe-22
Published: Wed Feb 25 2026 (02/25/2026, 23:25:45 UTC)
Source: CVE Database V5
Vendor/Project: zed-industries
Product: zed

Description

CVE-2026-27800 is a high-severity path traversal vulnerability in the Zed code editor's extension archive extraction process prior to version 0. 224. 4. The vulnerability arises from improper validation of ZIP entry filenames in the extract_zip() function, allowing malicious ZIP archives to write files outside the intended sandbox directory. Exploitation requires user interaction to install a crafted malicious extension, but no privileges or authentication are needed. Successful exploitation can lead to arbitrary file overwrite, compromising the integrity of the user's environment. The vulnerability has a CVSS score of 7. 4, reflecting its significant impact on integrity and scope. No known exploits are currently reported in the wild. Updating to version 0.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:55:47 UTC

Technical Analysis

CVE-2026-27800 is a path traversal vulnerability classified under CWE-22 affecting the Zed code editor, specifically versions prior to 0.224.4. The vulnerability exists in the extract_zip() function located in crates/util/src/archive.rs, which is responsible for extracting ZIP archives used to install extensions. This function fails to properly sanitize or validate ZIP entry filenames, allowing path traversal sequences such as '../' to be included. Consequently, a maliciously crafted ZIP archive can cause files to be written outside the designated sandbox directory intended for extension files. This can lead to overwriting critical files or placing malicious payloads in arbitrary locations on the filesystem. The vulnerability requires user interaction, as the user must install or update an extension containing the malicious archive. No privileges or authentication are required to exploit this vulnerability, increasing its risk. The CVSS v3.1 score of 7.4 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction, and impacting integrity with a scope change. The vulnerability does not affect confidentiality or availability directly but can compromise system integrity by allowing unauthorized file writes. The issue was fixed in version 0.224.4 by adding proper validation to prevent path traversal sequences in ZIP entries. No known exploits have been reported in the wild as of now, but the vulnerability poses a significant risk to users who install extensions from untrusted sources or malicious actors who can distribute compromised extensions.

Potential Impact

The primary impact of CVE-2026-27800 is the potential for arbitrary file overwrite on systems running vulnerable versions of the Zed code editor. This can lead to integrity violations where attackers can replace or add malicious files outside the intended extension sandbox. Such unauthorized file writes could be leveraged to execute arbitrary code, escalate privileges, or disrupt development environments. For organizations, this could result in compromised developer workstations, supply chain attacks via malicious extensions, or persistent backdoors. Since the vulnerability requires user interaction (installing a malicious extension), social engineering or compromised extension repositories could be vectors for exploitation. The scope of affected systems includes all users of Zed versions prior to 0.224.4, which may be significant in developer communities or enterprises relying on this editor. Although no known exploits are reported yet, the ease of exploitation and high impact on integrity make this a critical risk to address promptly. Failure to patch could lead to targeted attacks on software development environments, potentially affecting software supply chains and organizational security.

Mitigation Recommendations

To mitigate CVE-2026-27800, organizations and users should immediately update Zed to version 0.224.4 or later, where the vulnerability has been fixed by proper validation of ZIP entry paths. Until the update is applied, users should avoid installing extensions from untrusted or unknown sources to reduce the risk of malicious ZIP archives. Implementing endpoint security controls that monitor or restrict unauthorized file writes outside expected directories can help detect or prevent exploitation attempts. Additionally, organizations should enforce strict code editor extension policies, including vetting and digitally signing approved extensions. Security teams should educate developers about the risks of installing unverified extensions and encourage the use of secure development environments. Monitoring for unusual file system changes in extension directories may provide early detection of exploitation attempts. Finally, integrating software composition analysis and vulnerability scanning tools to identify vulnerable Zed versions across the enterprise can facilitate timely remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f88afb7ef31ef0b6add23

Added to database: 2/25/2026, 11:41:35 PM

Last enriched: 2/25/2026, 11:55:47 PM

Last updated: 2/26/2026, 4:37:15 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats