CVE-2026-39819: CWE-377: Insecure Temporary File in Go toolchain cmd/go
The "go bug" command writes to two files with predictable names in the system temporary directory (for example, "/tmp"). An attacker with access to the temporary directory can create a symlink in one of these names, causing "go bug" to overwrite the target of the symlink.
AI Analysis
Technical Summary
The vulnerability involves the "go bug" command in the Go toolchain writing to two files with predictable names in the system temporary directory (e.g., /tmp). Because these filenames are predictable, an attacker who can write to the temporary directory can create symbolic links with those names. When "go bug" runs, it follows the symlink and overwrites the linked target file, potentially leading to unauthorized file overwrite and integrity compromise. This issue is categorized under CWE-377: Insecure Temporary File.
Potential Impact
An attacker with access to the system's temporary directory can exploit this vulnerability to overwrite arbitrary files by creating symbolic links with predictable temporary filenames. This can lead to unauthorized modification of files, potentially affecting system integrity or causing denial of service. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict write access to the system temporary directory to trusted users only to prevent unauthorized creation of symbolic links. Avoid running the "go bug" command in untrusted environments or with elevated privileges.
CVE-2026-39819: CWE-377: Insecure Temporary File in Go toolchain cmd/go
Description
The "go bug" command writes to two files with predictable names in the system temporary directory (for example, "/tmp"). An attacker with access to the temporary directory can create a symlink in one of these names, causing "go bug" to overwrite the target of the symlink.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability involves the "go bug" command in the Go toolchain writing to two files with predictable names in the system temporary directory (e.g., /tmp). Because these filenames are predictable, an attacker who can write to the temporary directory can create symbolic links with those names. When "go bug" runs, it follows the symlink and overwrites the linked target file, potentially leading to unauthorized file overwrite and integrity compromise. This issue is categorized under CWE-377: Insecure Temporary File.
Potential Impact
An attacker with access to the system's temporary directory can exploit this vulnerability to overwrite arbitrary files by creating symbolic links with predictable temporary filenames. This can lead to unauthorized modification of files, potentially affecting system integrity or causing denial of service. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict write access to the system temporary directory to trusted users only to prevent unauthorized creation of symbolic links. Avoid running the "go bug" command in untrusted environments or with elevated privileges.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Go
- Date Reserved
- 2026-04-07T18:13:03.526Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69fcf0c1cbff5d86102bd5bf
Added to database: 5/7/2026, 8:06:25 PM
Last enriched: 5/7/2026, 8:22:10 PM
Last updated: 5/8/2026, 10:24:12 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.