CVE-2022-26049

Public Exploit
Arbitrary File Write via Archive Extraction (Zip Slip)

Description

This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability. **Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.32%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory snyk.io
Affected: n/a com.diffplug.gradle:goomph
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-26049?
CVE-2022-26049 has been scored as a medium severity vulnerability.
How to fix CVE-2022-26049?
To fix CVE-2022-26049, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-26049 being actively exploited in the wild?
It is possible that CVE-2022-26049 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-26049?
CVE-2022-26049 affects n/a com.diffplug.gradle:goomph.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.