Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29064: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zarf-dev zarf

0
High
VulnerabilityCVE-2026-29064cvecve-2026-29064cwe-22
Published: Fri Mar 06 2026 (03/06/2026, 16:13:17 UTC)
Source: CVE Database V5
Vendor/Project: zarf-dev
Product: zarf

Description

Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destination directory, enabling arbitrary file read or write on the system processing the package. This issue has been patched in version 0.73.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:53:46 UTC

Technical Analysis

Zarf is an airgap-native package manager designed for Kubernetes environments, facilitating offline package deployment. Between versions 0.54.0 and before 0.73.1, Zarf's archive extraction mechanism contains a path traversal vulnerability (CWE-22). Specifically, when extracting archives from Zarf packages, the software fails to properly restrict pathname resolution, allowing specially crafted packages to create symbolic links that point outside the designated extraction directory. This flaw enables attackers to manipulate file paths to read or write arbitrary files on the host system where the package is processed. The vulnerability does not require prior authentication or elevated privileges but does require user interaction to process the malicious package. The CVSS v3.1 score is 8.2 (high), reflecting the significant impact on confidentiality and integrity, with a local attack vector and low attack complexity. The vulnerability has been addressed in Zarf version 0.73.1 by implementing proper pathname validation and symlink handling during archive extraction. No public exploits or active exploitation campaigns have been reported, but the potential for serious system compromise exists if exploited.

Potential Impact

Successful exploitation of this vulnerability can lead to unauthorized disclosure and modification of sensitive files on systems running vulnerable Zarf versions. This compromises confidentiality and integrity, potentially allowing attackers to alter configuration files, inject malicious code, or exfiltrate sensitive data. Since Zarf is used in Kubernetes air-gapped environments, which often manage critical infrastructure or sensitive workloads, the impact can be severe, including disruption of container orchestration, deployment of malicious containers, or lateral movement within isolated networks. The vulnerability does not directly affect availability but could indirectly cause service disruption through system compromise. Organizations relying on Zarf for secure package management in Kubernetes clusters face increased risk of supply chain attacks and insider threats if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately upgrade all Zarf deployments to version 0.73.1 or later, where the vulnerability is patched. Until upgrades can be performed, restrict access to systems processing Zarf packages to trusted personnel only and validate all packages before processing. Implement strict file system monitoring and integrity checks on directories used for package extraction to detect unauthorized file modifications or symlink creations. Employ sandboxing or container isolation when processing untrusted packages to limit potential damage. Additionally, incorporate digital signature verification for Zarf packages to ensure authenticity and integrity before extraction. Regularly audit and review package sources and deployment workflows to minimize exposure to malicious packages. Finally, maintain up-to-date incident response plans to quickly address any suspected exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T20:51:43.482Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ab014fc48b3f10ffac9b5a

Added to database: 3/6/2026, 4:31:11 PM

Last enriched: 3/13/2026, 7:53:46 PM

Last updated: 4/21/2026, 1:53:17 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses