Vulnerability Description
The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Container | < 0.8.0 |
| Apple | Containerization | < 0.21.0 |
Related Weaknesses (CWE)
References
- https://github.com/apple/containerization/security/advisories/GHSA-cq3j-qj2h-6rvExploitVendor Advisory
FAQ
What is CVE-2026-20613?
CVE-2026-20613 is a vulnerability with a CVSS score of 7.8 (HIGH). The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or malic...
How severe is CVE-2026-20613?
CVE-2026-20613 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-20613?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Container, Apple Containerization.