Vulnerability Description
SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded. This issue was fixed in version 1.2.1.
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-44088?
CVE-2026-44088 is a documented vulnerability. SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Cent...
How severe is CVE-2026-44088?
CVSS scoring is not yet available for CVE-2026-44088. Check NVD for updates.
Is there a patch for CVE-2026-44088?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.