Medium severity5.6NVD Advisory· Published Apr 22, 2026· Updated Apr 24, 2026
CVE-2026-35363
CVE-2026-35363
Description
A vulnerability in the rm utility of uutils coreutils allows the bypass of safeguard mechanisms intended to protect the current directory. While the utility correctly refuses to delete . or .., it fails to recognize equivalent paths with trailing slashes, such as ./ or .///. An accidental or malicious execution of rm -rf ./ results in the silent recursive deletion of all contents within the current directory. The command further obscures the data loss by reporting a misleading 'Invalid input' error, which may cause users to miss the critical window for data recovery.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
coreutilscrates.io | <= 0.8.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/uutils/coreutils/issues/9749nvdExploitIssue TrackingVendor AdvisoryWEB
- github.com/advisories/GHSA-vchc-9ggh-3236ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35363ghsaADVISORY
News mentions
0No linked articles in our index yet.