🔐 CVE Alert

CVE-2026-5958

UNKNOWN 0.0

Race Condition in GNU Sed

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file() performs two separate, non-atomic filesystem operations on the same path: 1. resolves symlink to its target and stores the resolved path for determining when output is written, 2. opens the original symlink path (not the resolved one) to read the file. Between these two calls there is a race window. If an attacker atomically replaces the symlink with a different target during that window, sed will: read content from the new (attacker-chosen) symlink target and write the processed result to the path recorded in step 1. This can lead to arbitrary file overwrite with attacker-controlled content in the context of the sed process. This issue was fixed in version 4.10.

CWE CWE-367
Vendor gnu
Product sed
Published Apr 20, 2026
Last Updated Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for gnu sed

Be the first to know when new unknown vulnerabilities affecting gnu sed are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

GNU / Sed
4.1e < 4.10

References

NVD ↗ CVE.org ↗ EPSS Data ↗
gnu.org: https://www.gnu.org/software/sed/ cert.pl: https://cert.pl/en/posts/2026/04/CVE-2026-5958

Credits

Michał Majchrowicz (AFINE Team) Marcin Wyczechowski (AFINE Team)