🔐 CVE Alert

CVE-2026-32146

UNKNOWN 0.0

Improper Path Validation in Git Dependency Handling Allows Arbitrary File System Modification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
3th

Improper path validation vulnerability in the Gleam compiler's handling of git dependencies allows arbitrary file system modification during dependency download. Dependency names from gleam.toml and manifest.toml are incorporated into filesystem paths without sufficient validation or confinement to the intended dependency directory, allowing attacker-controlled paths (via relative traversal such as ../ or absolute paths) to target filesystem locations outside that directory. When resolving git dependencies (e.g. via gleam deps download), the computed path is used for filesystem operations including directory deletion and creation. This vulnerability occurs during the dependency resolution and download phase, which is generally expected to be limited to fetching and preparing dependencies within a confined directory. A malicious direct or transitive git dependency can exploit this issue to delete and overwrite arbitrary directories outside the intended dependency directory, including attacker-chosen absolute paths, potentially causing data loss. In some environments, this may be further leveraged to achieve code execution, for example by overwriting git hooks or shell configuration files. This issue affects Gleam from 1.9.0-rc1 until 1.15.4.

CWE CWE-22
Vendor gleam
Product gleam
Published Apr 11, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for gleam gleam

Be the first to know when new unknown vulnerabilities affecting gleam gleam are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Gleam / Gleam
1.9.0-rc1 < *
Gleam / Gleam
1.9.0-rc1 < * a4fde22445ab8e5cc79c2ff48971616cb570702c < *
Gleam / Gleam
v1.9.0-rc1-elixir < v1.15.4-elixir v1.9.0-rc1-erlang < v1.15.4-erlang v1.9.0-rc1-node < v1.15.4-node v1.9.0-rc1-node-slim < v1.15.4-node-slim v1.9.0-rc1-elixir-slim < v1.15.4-elixir-slim v1.9.0-rc1-erlang-slim < v1.15.4-erlang-slim v1.9.0-rc1-erlang-alpine < v1.15.4-erlang-alpine v1.9.0-rc1-elixir-alpine < v1.15.4-elixir-alpine v1.9.0-rc1-node-alpine < v1.15.4-node-alpine v1.9.0-rc1-scratch < v1.15.4-scratch

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/gleam-lang/gleam/security/advisories/GHSA-vq5j-55vx-wq8j cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-32146.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-32146 github.com: https://github.com/gleam-lang/gleam/commit/1aa5d8e594b0aa240bb213fce6ee19c65e6d5bcf github.com: https://github.com/gleam-lang/gleam/commit/2dc0467f822c75de94697a912755d172928ee40a

Credits

John Downey Louis Pilfold Jonatan Männchen / EEF