CVE-2026-27976: CWE-61: UNIX Symbolic Link (Symlink) Following in zed-industries zed
CVE-2026-27976 is a high-severity vulnerability in the zed code editor prior to version 0. 224. 4. The issue arises from insecure handling of symbolic links during tar archive extraction in the extension installer, allowing an attacker to create symlinks that point outside the intended directory. This enables arbitrary file writes to host system paths, effectively escaping the extension sandbox and potentially leading to remote code execution. Exploitation requires user interaction to install a malicious extension but no prior privileges. The vulnerability has a CVSS score of 8. 8, reflecting its critical impact on confidentiality, integrity, and availability. The flaw is patched in version 0. 224.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27976 affects the zed code editor's extension installer component prior to version 0.224.4. The root cause lies in the tar archive extraction process implemented by the async_tar::Archive::unpack function, which creates symbolic links from the archive without validating their target paths. The path guard mechanism, writeable_path_from_extension, only performs lexical prefix checks and does not resolve symlinks, allowing an attacker to craft a tar archive that first creates a symlink inside the extension working directory pointing to an arbitrary location outside the sandbox (e.g., the root directory '/'). Subsequent files extracted through this symlink are written to arbitrary host file system locations, bypassing the intended sandbox restrictions. This symlink following vulnerability corresponds to CWE-61. Exploiting this flaw enables an attacker to overwrite critical files or place malicious executables on the host system, leading to arbitrary code execution with the privileges of the user running zed. The attack vector requires the victim to install a malicious extension containing the crafted tar archive, thus requiring user interaction but no prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The issue was fixed in zed version 0.224.4 by adding proper symlink validation and resolving paths before extraction to prevent directory traversal and sandbox escape. No known exploits in the wild have been reported yet.
Potential Impact
This vulnerability poses a significant risk to organizations using the zed code editor, especially those who install third-party extensions. Successful exploitation allows attackers to escape the extension sandbox and write files arbitrarily on the host system, potentially overwriting system binaries, configuration files, or placing backdoors. This can lead to full system compromise, data theft, or disruption of development environments. The impact extends to confidentiality, integrity, and availability of affected systems. Since zed is used in software development workflows, compromised environments could lead to supply chain risks if malicious code is injected into source code or build processes. The requirement for user interaction (installing a malicious extension) somewhat limits the attack scope but does not eliminate risk, especially in environments where developers frequently install new extensions from untrusted sources. The vulnerability also undermines trust in the extension ecosystem and could be leveraged in targeted attacks against software developers or organizations relying on zed.
Mitigation Recommendations
The primary mitigation is to upgrade the zed code editor to version 0.224.4 or later, where the vulnerability is patched. Until upgrading, organizations should restrict extension installations to trusted sources only and audit all installed extensions for suspicious content. Employ application whitelisting or sandboxing techniques to limit the impact of potential exploitation. Developers should avoid installing extensions from unverified or unknown authors. Additionally, monitoring file system changes in the extension directories and host system critical paths can help detect exploitation attempts. Security teams should educate users about the risks of installing untrusted extensions and implement endpoint detection and response (EDR) solutions to identify anomalous file writes or process executions originating from zed. Finally, consider isolating development environments or using containerized setups to reduce the blast radius of a potential compromise.
Affected Countries
United States, Germany, United Kingdom, India, China, Canada, France, Australia, Japan, South Korea
CVE-2026-27976: CWE-61: UNIX Symbolic Link (Symlink) Following in zed-industries zed
Description
CVE-2026-27976 is a high-severity vulnerability in the zed code editor prior to version 0. 224. 4. The issue arises from insecure handling of symbolic links during tar archive extraction in the extension installer, allowing an attacker to create symlinks that point outside the intended directory. This enables arbitrary file writes to host system paths, effectively escaping the extension sandbox and potentially leading to remote code execution. Exploitation requires user interaction to install a malicious extension but no prior privileges. The vulnerability has a CVSS score of 8. 8, reflecting its critical impact on confidentiality, integrity, and availability. The flaw is patched in version 0. 224.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27976 affects the zed code editor's extension installer component prior to version 0.224.4. The root cause lies in the tar archive extraction process implemented by the async_tar::Archive::unpack function, which creates symbolic links from the archive without validating their target paths. The path guard mechanism, writeable_path_from_extension, only performs lexical prefix checks and does not resolve symlinks, allowing an attacker to craft a tar archive that first creates a symlink inside the extension working directory pointing to an arbitrary location outside the sandbox (e.g., the root directory '/'). Subsequent files extracted through this symlink are written to arbitrary host file system locations, bypassing the intended sandbox restrictions. This symlink following vulnerability corresponds to CWE-61. Exploiting this flaw enables an attacker to overwrite critical files or place malicious executables on the host system, leading to arbitrary code execution with the privileges of the user running zed. The attack vector requires the victim to install a malicious extension containing the crafted tar archive, thus requiring user interaction but no prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The issue was fixed in zed version 0.224.4 by adding proper symlink validation and resolving paths before extraction to prevent directory traversal and sandbox escape. No known exploits in the wild have been reported yet.
Potential Impact
This vulnerability poses a significant risk to organizations using the zed code editor, especially those who install third-party extensions. Successful exploitation allows attackers to escape the extension sandbox and write files arbitrarily on the host system, potentially overwriting system binaries, configuration files, or placing backdoors. This can lead to full system compromise, data theft, or disruption of development environments. The impact extends to confidentiality, integrity, and availability of affected systems. Since zed is used in software development workflows, compromised environments could lead to supply chain risks if malicious code is injected into source code or build processes. The requirement for user interaction (installing a malicious extension) somewhat limits the attack scope but does not eliminate risk, especially in environments where developers frequently install new extensions from untrusted sources. The vulnerability also undermines trust in the extension ecosystem and could be leveraged in targeted attacks against software developers or organizations relying on zed.
Mitigation Recommendations
The primary mitigation is to upgrade the zed code editor to version 0.224.4 or later, where the vulnerability is patched. Until upgrading, organizations should restrict extension installations to trusted sources only and audit all installed extensions for suspicious content. Employ application whitelisting or sandboxing techniques to limit the impact of potential exploitation. Developers should avoid installing extensions from unverified or unknown authors. Additionally, monitoring file system changes in the extension directories and host system critical paths can help detect exploitation attempts. Security teams should educate users about the risks of installing untrusted extensions and implement endpoint detection and response (EDR) solutions to identify anomalous file writes or process executions originating from zed. Finally, consider isolating development environments or using containerized setups to reduce the blast radius of a potential compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-25T03:24:57.793Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f8c2fb7ef31ef0b6c21d1
Added to database: 2/25/2026, 11:56:31 PM
Last enriched: 2/26/2026, 12:10:50 AM
Last updated: 2/26/2026, 2:43:57 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumCVE-2026-2489: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in readymadeweb TP2WP Importer
MediumCVE-2026-2029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livemesh Livemesh Addons for Beaver Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.