Unrated severityNVD Advisory· Published Mar 20, 2026· Updated Mar 24, 2026
Halloy has a file transfer path traveral vulnerability
CVE-2026-32733
Description
Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, the DCC receive flow did not sanitize filenames from incoming DCC SEND requests. A remote IRC user could send a filename with path traversal sequences like ../../.ssh/authorized_keys and the file would be written outside the user's configured save_directory. With auto-accept enabled this required zero interaction from the victim. Starting with commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, all identified code paths sanitize filenames through a shared sanitize_filename function.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/squidowl/halloy/commit/0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6mitrex_refsource_MISC
- github.com/squidowl/halloy/security/advisories/GHSA-fqrv-rfg4-rv89mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.