๐Ÿ” CVE Alert

CVE-2026-27606

UNKNOWN 0.0

Rollup 4 has Arbitrary File Write via Path Traversal

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.

CWE CWE-22
Vendor rollup
Product rollup
Published Feb 25, 2026
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for rollup rollup

Be the first to know when new unknown vulnerabilities affecting rollup rollup are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

rollup / rollup
< 2.80.0 >= 3.0.0, < 3.30.0 >= 4.0.0, < 4.59.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc github.com: https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2 github.com: https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e github.com: https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3 github.com: https://github.com/rollup/rollup/releases/tag/v2.80.0 github.com: https://github.com/rollup/rollup/releases/tag/v3.30.0 github.com: https://github.com/rollup/rollup/releases/tag/v4.59.0