CVE-2026-8784

medium

Description

A vulnerability was detected in npitre cramfs-tools up to 2.2. Affected is the function change_file_status of the file cramfsck.c. Performing a manipulation results in symlink following. The attack requires a local approach. The exploit is now public and may be used. The patch is named b4a3a695c9873f824907bd15659f2a6ac7667b4f. It is recommended to apply a patch to fix this issue.

References

https://vuldb.com/vuln/364408/cti

https://vuldb.com/vuln/364408

https://vuldb.com/submit/811897

https://github.com/npitre/cramfs-tools/issues/13#issuecomment-4306102583

https://github.com/npitre/cramfs-tools/issues/13

https://github.com/npitre/cramfs-tools/commit/b4a3a695c9873f824907bd15659f2a6ac7667b4f

https://github.com/npitre/cramfs-tools/

Details

Source: Mitre, NVD

Published: 2026-05-18

Updated: 2026-05-18

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:L/AC:L/Au:M/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 4.2

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

CVSS v4

Base Score: 4.6

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00016