VYPR
High severityNVD Advisory· Published Mar 6, 2026· Updated Mar 6, 2026

Zarf: Symlink targets in archives are not validated against destination directory

CVE-2026-29064

Description

Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destination directory, enabling arbitrary file read or write on the system processing the package. This issue has been patched in version 0.73.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in Zarf archive extraction allows crafted packages to create symlinks outside the destination directory, enabling arbitrary file read or write.

Vulnerability

Overview

CVE-2026-29064 is a path traversal vulnerability in Zarf, an airgap-native package manager for Kubernetes, affecting versions 0.54.0 through 0.73.0. The flaw resides in the archive extraction code within src/pkg/archive/archive.go, where symlink targets from archive entries are not validated to ensure they resolve within the extraction destination directory. Specifically, the defaultHandler function joins the destination path with the symlink target using filepath.Join but does not verify that the resolved path remains under the intended directory, allowing a crafted archive entry with a LinkTarget such as ../../../../etc/shadow to escape the extraction root [1][2].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious Zarf package or archive containing symlink entries with targets pointing outside the destination directory. The attack requires processing of an untrusted or semi-trusted package, which could be received via file transfer, downloaded from a registry, or shared across organizational boundaries. The vulnerability also affects SDK consumers who utilize package load or archive operations. No authentication is needed beyond the ability to supply a crafted package to a system running an affected Zarf version [2].

Impact

Successful exploitation allows an attacker to achieve arbitrary file read or write on the system processing the package. By creating symlinks to sensitive files (e.g., /etc/shadow, SSH keys, or configuration files), an attacker could read their contents or overwrite them. In scenarios where an overwritten file is subsequently executed, this could lead to code execution, though the vulnerability itself does not provide an explicit execution path [2].

Mitigation

The issue has been patched in Zarf version 0.73.1, released on 2026-03-03 [4]. Users are advised to upgrade immediately. If immediate upgrade is not possible, only process Zarf packages from fully trusted sources. Previously created packages do not need to be rebuilt; only the Zarf binary or SDK package versions must be updated [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/zarf-dev/zarf/src/pkg/archiveGo
>= 0.54.0, < 0.73.10.73.1

Affected products

2
  • Lfprojects/Zarfllm-fuzzy
    Range: >=0.54.0, <0.73.1
  • zarf-dev/zarfv5
    Range: >= 0.54.0, < 0.73.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.