๐Ÿ” CVE Alert

CVE-2026-26157

HIGH 7.0

Busybox: busybox: arbitrary file overwrite and potential code execution via incomplete path sanitization

CVSS Score
7.0
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.

CWE CWE-73
Vendor red hat
Product red hat enterprise linux 6
Published Feb 11, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat enterprise linux 6

Be the first to know when new high vulnerabilities affecting red hat red hat enterprise linux 6 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Hardened Images
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2026-26157 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2439039 git.busybox.net: https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb

Credits

Red Hat would like to thank Calil Khalil (Hakal) for reporting this issue.