๐Ÿ” CVE Alert

CVE-2026-32733

UNKNOWN 0.0

Halloy has a file transfer path traveral vulnerability

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
14th

Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, the DCC receive flow did not sanitize filenames from incoming `DCC SEND` requests. A remote IRC user could send a filename with path traversal sequences like `../../.ssh/authorized_keys` and the file would be written outside the user's configured `save_directory`. With auto-accept enabled this required zero interaction from the victim. Starting with commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, all identified code paths sanitize filenames through a shared `sanitize_filename` function.

CWE CWE-22
Vendor squidowl
Product halloy
Published Mar 20, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for squidowl halloy

Be the first to know when new unknown vulnerabilities affecting squidowl halloy are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

squidowl / halloy
<= 2026.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/squidowl/halloy/security/advisories/GHSA-fqrv-rfg4-rv89 github.com: https://github.com/squidowl/halloy/commit/0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6