Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 28 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Junrar Project
Junrar Project junrar |
|
| CPEs | cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Junrar Project
Junrar Project junrar |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Junrar
Junrar junrar |
|
| Vendors & Products |
Junrar
Junrar junrar |
Thu, 26 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue. | |
| Title | Junrar has arbitrary file write due to backslash path traversal bypass in LocalFolderExtractor on Linux/Unix | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-26T22:20:03.765Z
Updated: 2026-03-02T20:47:15.670Z
Reserved: 2026-02-25T15:28:40.648Z
Link: CVE-2026-28208
Updated: 2026-03-02T20:47:04.767Z
Status : Modified
Published: 2026-02-26T23:16:35.440
Modified: 2026-03-02T21:16:27.533
Link: CVE-2026-28208