Vulnerability Description
The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-good inputs) does not sanitize output filenames. Extracting a malicious archive file with the "pack" subcommand can write files to arbitrary locations on the filesystem.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | < 1.25.10 |
Related Weaknesses (CWE)
References
- https://go.dev/cl/767520Patch
- https://go.dev/issue/78778Issue Tracking
- https://groups.google.com/g/golang-announce/c/qcCIEXso47MIssue TrackingMailing List
- https://pkg.go.dev/vuln/GO-2026-4979Vendor Advisory
FAQ
What is CVE-2026-39817?
CVE-2026-39817 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-good inputs) does not sanitize output filenames. Extracting a malicious archive file with the "pack" sub...
How severe is CVE-2026-39817?
CVE-2026-39817 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-39817?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go.