Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2818: CWE-23 Relative Path Traversal in VMware Spring Data Geode

0
High
VulnerabilityCVE-2026-2818cvecve-2026-2818cwe-23
Published: Fri Feb 20 2026 (02/20/2026, 16:03:21 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: Spring Data Geode

Description

A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:19:16 UTC

Technical Analysis

CVE-2026-2818 is a zip-slip path traversal vulnerability classified under CWE-23, affecting VMware's Spring Data Geode product, specifically version 2.0.0.RELEASE. The vulnerability exists in the import snapshot functionality, which processes ZIP archives to restore or import data snapshots. Due to insufficient validation of file paths within the ZIP archive, an attacker can craft malicious ZIP files containing path traversal sequences (e.g., '..\' on Windows) that cause files to be extracted outside the intended directory. This allows arbitrary file writes to locations on the filesystem that should be protected. The vulnerability is limited to Windows operating systems due to the path handling specifics. The CVSS v3.1 score is 8.2 (high), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Confidentiality impact is low, integrity impact is high, and availability impact is none. This means an attacker can modify or overwrite files, potentially leading to code execution or system compromise, but cannot directly cause denial of service or significant data disclosure. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability was published on February 20, 2026, and assigned by HeroDevs. It is critical for organizations using Spring Data Geode on Windows to address this issue promptly.

Potential Impact

The primary impact of CVE-2026-2818 is the ability for an attacker to write arbitrary files outside the intended extraction directory on Windows systems running Spring Data Geode 2.0.0.RELEASE. This can lead to unauthorized modification of files, potentially overwriting critical system or application files, which may result in privilege escalation, remote code execution, or persistent backdoors. The integrity of the affected systems is severely compromised. Although confidentiality impact is low, the ability to alter files can indirectly lead to data breaches or system manipulation. Availability is not directly affected, but system stability could be impacted if critical files are overwritten. Since the attack vector is network-based and requires no privileges, attackers can remotely exploit this vulnerability by tricking users or systems into importing malicious snapshot files. This poses a significant risk to organizations relying on Spring Data Geode for data management, especially those operating in Windows environments. The lack of known exploits in the wild currently reduces immediate risk, but the high severity score and ease of exploitation make it a critical issue to address. Organizations in sectors with high reliance on VMware products, such as financial services, healthcare, and government, may face elevated risks due to potential targeted attacks.

Mitigation Recommendations

To mitigate CVE-2026-2818, organizations should first check for any official patches or updates from VMware and apply them immediately once available. In the absence of patches, implement strict input validation and sanitization on ZIP archive paths before extraction, ensuring that no path traversal sequences are allowed. Use secure extraction libraries or functions that enforce extraction within a designated directory. Restrict permissions on directories used for snapshot imports to limit potential damage from arbitrary file writes. Employ application-layer firewalls or intrusion detection systems to monitor and block suspicious ZIP file uploads or imports. Educate users and administrators about the risks of importing untrusted snapshot files, emphasizing the need for verification before processing. Consider isolating the import process in a sandboxed or containerized environment to limit the impact of potential exploitation. Regularly audit and monitor filesystem changes in directories related to Spring Data Geode to detect unauthorized modifications. Finally, maintain up-to-date backups to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HeroDevs
Date Reserved
2026-02-19T17:07:41.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c42f2c4d84f260d040b7

Added to database: 2/20/2026, 8:29:35 PM

Last enriched: 2/28/2026, 2:19:16 PM

Last updated: 4/6/2026, 9:48:14 AM

Views: 485

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses