Vulnerability Description
jq is a command-line JSON processor. In 1.8.1 and earlier, jq accepts embedded NUL bytes in import paths at the jq-language level, but later resolves those paths through C string operations during module and data-file lookup. This creates a mismatch between the logical import string that policy or audit code may validate and the on-disk path that jq actually opens.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jqlang | Jq | <= 1.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/jqlang/jq/security/advisories/GHSA-7q7g-mrq3-phxrExploitMitigationVendor Advisory
- https://github.com/jqlang/jq/security/advisories/GHSA-7q7g-mrq3-phxrExploitMitigationVendor Advisory
FAQ
What is CVE-2026-43895?
CVE-2026-43895 is a vulnerability with a CVSS score of 4.4 (MEDIUM). jq is a command-line JSON processor. In 1.8.1 and earlier, jq accepts embedded NUL bytes in import paths at the jq-language level, but later resolves those paths through C string operations during mod...
How severe is CVE-2026-43895?
CVE-2026-43895 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43895?
Check the references section above for vendor advisories and patch information. Affected products include: Jqlang Jq.