๐Ÿ” CVE Alert

CVE-2026-41433

HIGH 8.4

OpenTelemetry eBPF Instrumentation: Privileged Java agent injection allows arbitrary host file overwrite via untrusted TMPDIR

CVSS Score
8.4
EPSS Score
0.0%
EPSS Percentile
0th

OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the OpenTelemetry standard. From 0.4.0 to before 0.8.0, a flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary host files when Java injection is enabled and OBI is running with elevated privileges. The injector trusted TMPDIR from the target process and used unsafe file creation semantics, enabling both filesystem boundary escape and symlink-based file clobbering. This vulnerability is fixed in 0.8.0.

CWE CWE-22 CWE-59
Vendor open-telemetry
Product opentelemetry-ebpf-instrumentation
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for open-telemetry opentelemetry-ebpf-instrumentation

Be the first to know when new high vulnerabilities affecting open-telemetry opentelemetry-ebpf-instrumentation are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

open-telemetry / opentelemetry-ebpf-instrumentation
>= 0.4.0, < 0.8.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/open-telemetry/opentelemetry-ebpf-instrumentation/security/advisories/GHSA-8gmg-3w2q-65f4 github.com: https://github.com/open-telemetry/opentelemetry-ebpf-instrumentation/releases/tag/v0.8.0