๐Ÿ” CVE Alert

CVE-2026-35345

MEDIUM 5.3

uutils coreutils tail Privileged Information Disclosure via Symlink Replacement Race

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the tail utility of uutils coreutils allows for the exfiltration of sensitive file contents when using the --follow=name option. Unlike GNU tail, the uutils implementation continues to monitor a path after it has been replaced by a symbolic link, subsequently outputting the contents of the link's target. In environments where a privileged user (e.g., root) monitors a log directory, a local attacker with write access to that directory can replace a log file with a symlink to a sensitive system file (such as /etc/shadow), causing tail to disclose the contents of the sensitive file.

CWE CWE-367 CWE-59
Vendor uutils
Product coreutils
Published Apr 22, 2026
Last Updated Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for uutils coreutils

Be the first to know when new medium vulnerabilities affecting uutils coreutils are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

Uutils / coreutils
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/uutils/coreutils/issues/10328

Credits

Zellic