🔐 CVE Alert

CVE-2026-27709

UNKNOWN 0.0

NanaZip .NET Single-File Manifest Parser Vulnerable to Out-of-Bounds Read via Unchecked RelativePathLength

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, NanaZip’s `.NET Single File Application` parser has an out-of-bounds read vulnerability in manifest parsing. A crafted bundle can provide a malformed `RelativePathLength` so the parser constructs a `std::string` from memory beyond `HeaderBuffer`, leading to crash and potential in-process memory disclosure. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.

CWE CWE-125
Vendor m2team
Product nanazip
Published Feb 25, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for m2team nanazip

Be the first to know when new unknown vulnerabilities affecting m2team nanazip are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

M2Team / NanaZip
>= 5.0.1252.0, < 6.0.1638.0 >= 6.1, < 6.5.1638.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/M2Team/NanaZip/security/advisories/GHSA-vr4w-xc78-w6fv