Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27976: CWE-61: UNIX Symbolic Link (Symlink) Following in zed-industries zed

0
High
VulnerabilityCVE-2026-27976cvecve-2026-27976cwe-61
Published: Wed Feb 25 2026 (02/25/2026, 23:34:40 UTC)
Source: CVE Database V5
Vendor/Project: zed-industries
Product: zed

Description

CVE-2026-27976 is a high-severity vulnerability in the zed code editor prior to version 0. 224. 4. The issue arises from insecure handling of symbolic links during tar archive extraction in the extension installer, allowing an attacker to create symlinks that point outside the intended directory. This enables arbitrary file writes to host system paths, effectively escaping the extension sandbox and potentially leading to remote code execution. Exploitation requires user interaction to install a malicious extension but no prior privileges. The vulnerability has a CVSS score of 8. 8, reflecting its critical impact on confidentiality, integrity, and availability. The flaw is patched in version 0. 224.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:10:50 UTC

Technical Analysis

The vulnerability CVE-2026-27976 affects the zed code editor's extension installer component prior to version 0.224.4. The root cause lies in the tar archive extraction process implemented by the async_tar::Archive::unpack function, which creates symbolic links from the archive without validating their target paths. The path guard mechanism, writeable_path_from_extension, only performs lexical prefix checks and does not resolve symlinks, allowing an attacker to craft a tar archive that first creates a symlink inside the extension working directory pointing to an arbitrary location outside the sandbox (e.g., the root directory '/'). Subsequent files extracted through this symlink are written to arbitrary host file system locations, bypassing the intended sandbox restrictions. This symlink following vulnerability corresponds to CWE-61. Exploiting this flaw enables an attacker to overwrite critical files or place malicious executables on the host system, leading to arbitrary code execution with the privileges of the user running zed. The attack vector requires the victim to install a malicious extension containing the crafted tar archive, thus requiring user interaction but no prior authentication or elevated privileges. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. The issue was fixed in zed version 0.224.4 by adding proper symlink validation and resolving paths before extraction to prevent directory traversal and sandbox escape. No known exploits in the wild have been reported yet.

Potential Impact

This vulnerability poses a significant risk to organizations using the zed code editor, especially those who install third-party extensions. Successful exploitation allows attackers to escape the extension sandbox and write files arbitrarily on the host system, potentially overwriting system binaries, configuration files, or placing backdoors. This can lead to full system compromise, data theft, or disruption of development environments. The impact extends to confidentiality, integrity, and availability of affected systems. Since zed is used in software development workflows, compromised environments could lead to supply chain risks if malicious code is injected into source code or build processes. The requirement for user interaction (installing a malicious extension) somewhat limits the attack scope but does not eliminate risk, especially in environments where developers frequently install new extensions from untrusted sources. The vulnerability also undermines trust in the extension ecosystem and could be leveraged in targeted attacks against software developers or organizations relying on zed.

Mitigation Recommendations

The primary mitigation is to upgrade the zed code editor to version 0.224.4 or later, where the vulnerability is patched. Until upgrading, organizations should restrict extension installations to trusted sources only and audit all installed extensions for suspicious content. Employ application whitelisting or sandboxing techniques to limit the impact of potential exploitation. Developers should avoid installing extensions from unverified or unknown authors. Additionally, monitoring file system changes in the extension directories and host system critical paths can help detect exploitation attempts. Security teams should educate users about the risks of installing untrusted extensions and implement endpoint detection and response (EDR) solutions to identify anomalous file writes or process executions originating from zed. Finally, consider isolating development environments or using containerized setups to reduce the blast radius of a potential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.793Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f8c2fb7ef31ef0b6c21d1

Added to database: 2/25/2026, 11:56:31 PM

Last enriched: 2/26/2026, 12:10:50 AM

Last updated: 2/26/2026, 2:43:57 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats