๐Ÿ” CVE Alert

CVE-2026-43895

MEDIUM 4.4

jq: Embedded NUL in jq import paths causes local redaction-policy bypass and preserves sensitive fields in published artifacts

CVSS Score
4.4
EPSS Score
0.0%
EPSS Percentile
0th

jq is a command-line JSON processor. In 1.8.1 and earlier, jq accepts embedded NUL bytes in import paths at the jq-language level, but later resolves those paths through C string operations during module and data-file lookup. This creates a mismatch between the logical import string that policy or audit code may validate and the on-disk path that jq actually opens.

CWE CWE-20 CWE-158
Vendor jqlang
Product jq
Published May 11, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for jqlang jq

Be the first to know when new medium vulnerabilities affecting jqlang jq are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

jqlang / jq
<= 1.8.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jqlang/jq/security/advisories/GHSA-7q7g-mrq3-phxr