Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3067: Path Traversal in HummerRisk

0
Medium
VulnerabilityCVE-2026-3067cvecve-2026-3067
Published: Tue Feb 24 2026 (02/24/2026, 03:32:07 UTC)
Source: CVE Database V5
Product: HummerRisk

Description

A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTarGZ/extractZip of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/CommandUtils.java of the component Archive Extraction. The manipulation leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:57:58 UTC

Technical Analysis

CVE-2026-3067 identifies a path traversal vulnerability in HummerRisk, specifically in the extractTarGZ and extractZip functions located in the hummer-common-core module. These functions handle archive extraction but fail to properly sanitize or validate file paths within the extracted archives. This allows an attacker to craft malicious .tar.gz or .zip archives containing file paths with directory traversal sequences (e.g., ../), enabling extraction of files outside the intended directory. The vulnerability can be exploited remotely without user interaction, requiring only low-level privileges, which lowers the barrier for exploitation. The impact includes unauthorized file creation or overwriting on the host system, potentially leading to integrity violations or denial of service if critical files are overwritten. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to limited confidentiality impact but notable integrity and availability concerns. The vendor was notified but has not issued a patch or response, increasing the risk window. No known exploits are currently active in the wild, but public disclosure means attackers could develop exploits. The vulnerability affects all HummerRisk versions from 1.0 through 1.5.0, necessitating urgent attention from users of these versions.

Potential Impact

The path traversal vulnerability allows attackers to write arbitrary files outside the intended extraction directory, which can compromise system integrity by overwriting critical configuration or executable files. This could lead to unauthorized code execution if malicious files are placed in executable paths or disrupt normal operations by corrupting essential files, impacting availability. Confidentiality impact is limited as the vulnerability primarily concerns file write operations rather than read access. The ease of remote exploitation without user interaction and low privilege requirements increases the risk of widespread exploitation in environments where HummerRisk is deployed. Organizations relying on HummerRisk for risk management or related functions may face operational disruptions, potential data corruption, or escalation of privileges if combined with other vulnerabilities. The lack of vendor response and patch availability prolongs exposure, increasing the likelihood of exploitation attempts over time.

Mitigation Recommendations

Organizations should immediately audit their use of HummerRisk to identify affected versions (1.0 through 1.5.0) and restrict exposure by limiting network access to the application. As no official patch is available, implement strict input validation and sanitization on archive files before extraction, possibly by using external sandboxed extraction tools that enforce path normalization and prevent directory traversal. Monitor file system changes in directories used for archive extraction to detect suspicious activity. Employ application-layer firewalls or intrusion detection systems to identify and block malicious archive uploads or extraction attempts. Consider isolating HummerRisk in a container or virtual machine with limited file system permissions to contain potential damage. Maintain regular backups of critical files to enable recovery if overwriting occurs. Engage with the vendor for updates and monitor security advisories for patches or workarounds. Finally, educate administrators about the risks and signs of exploitation related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-23T18:51:08.121Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699d1f63be58cf853b2dec75

Added to database: 2/24/2026, 3:47:47 AM

Last enriched: 3/4/2026, 1:57:58 AM

Last updated: 4/10/2026, 7:52:47 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses