`PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to execute host binaries (like `/bin/bash`) with root privileges.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=CVE-2026-44933 |
|
History
Wed, 20 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | `PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to execute host binaries (like `/bin/bash`) with root privileges. | |
| Title | Path Traversal in Plugin Loading in libzypp | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: suse
Published: 2026-05-20T08:51:12.770Z
Updated: 2026-05-20T12:18:50.304Z
Reserved: 2026-05-08T12:29:48.966Z
Link: CVE-2026-44933
Updated: 2026-05-20T12:18:42.731Z
Status : Deferred
Published: 2026-05-20T10:16:28.453
Modified: 2026-05-20T14:01:24.027
Link: CVE-2026-44933
No data.