VYPR
High severityNVD Advisory· Published May 15, 2026· Updated May 15, 2026

CVE-2026-44088

CVE-2026-44088

Description

SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded.

This issue was fixed in version 1.2.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SzafirHost's JAR signature verification uses JarInputStream while class loading uses JarFile, enabling an attacker to inject malicious code via a crafted ZIP/JAR hybrid.

Vulnerability

Overview

CVE-2026-44088 is a high-severity vulnerability in SzafirHost, an application by Krajowa Izba Rozliczeniowa. The root cause is a mismatch between the methods used for JAR signature verification and class loading. Verification relies on JarInputStream, which reads the file from the beginning, while class loading uses JarFile/URLClassLoader, which reads the Central Directory from the end of the file. This discrepancy allows an attacker to craft a file that combines a genuine, signed JAR with a malicious ZIP archive, causing the signature check to pass but the malicious classes to be loaded [2].

Exploitation

An attacker can exploit this by providing a specially crafted file that appears to be a valid signed JAR but contains appended malicious ZIP data. The attack does not require authentication; it can be triggered when SzafirHost downloads or processes such a file. The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type) [2].

Impact

Successful exploitation leads to remote code execution, allowing the attacker to execute arbitrary code on the affected system. This could result in full compromise of the host running SzafirHost, including data theft, malware installation, or further lateral movement within the network.

Mitigation

The issue has been fixed in SzafirHost version 1.2.1. Users are strongly advised to update immediately. The vulnerability was reported to CERT Polska, which coordinated the disclosure process [2].

AI Insight generated by deepseek/deepseek-v4-flash-20260423 on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.