CVE-2021-4435
Yarn: untrusted search path
CVSS Score
7.7
EPSS Score
0.0%
EPSS Percentile
0th
An untrusted search path vulnerability was found in Yarn. When a victim runs certain Yarn commands in a directory with attacker-controlled content, malicious commands could be executed in unexpected ways.
| CWE | CWE-426 |
| Vendor | n/a |
| Product | yarn |
| Published | Feb 4, 2024 |
| Last Updated | Jun 17, 2025 |
Stay Ahead of the Next One
Get instant alerts for n/a yarn
Be the first to know when new high vulnerabilities affecting n/a yarn are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
n/a / yarn
All versions affected Fedora / Fedora
All versions affected Fedora / Extra Packages for Enterprise Linux
All versions affected References
access.redhat.com: https://access.redhat.com/security/cve/CVE-2021-4435 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2262284 github.com: https://github.com/yarnpkg/yarn/commit/67fcce88935e45092ffa2674c08053f1ef5268a1 github.com: https://github.com/yarnpkg/yarn/releases/tag/v1.22.13
Credits
Red Hat would like to thank Paul Gerste (Sonar) for reporting this issue.