CVE-2026-44088
Description
SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded.
This issue was fixed in version 1.2.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SzafirHost's JAR signature verification uses JarInputStream while class loading uses JarFile, enabling an attacker to inject malicious code via a crafted ZIP/JAR hybrid.
Vulnerability
Overview
CVE-2026-44088 is a high-severity vulnerability in SzafirHost, an application by Krajowa Izba Rozliczeniowa. The root cause is a mismatch between the methods used for JAR signature verification and class loading. Verification relies on JarInputStream, which reads the file from the beginning, while class loading uses JarFile/URLClassLoader, which reads the Central Directory from the end of the file. This discrepancy allows an attacker to craft a file that combines a genuine, signed JAR with a malicious ZIP archive, causing the signature check to pass but the malicious classes to be loaded [2].
Exploitation
An attacker can exploit this by providing a specially crafted file that appears to be a valid signed JAR but contains appended malicious ZIP data. The attack does not require authentication; it can be triggered when SzafirHost downloads or processes such a file. The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type) [2].
Impact
Successful exploitation leads to remote code execution, allowing the attacker to execute arbitrary code on the affected system. This could result in full compromise of the host running SzafirHost, including data theft, malware installation, or further lateral movement within the network.
Mitigation
The issue has been fixed in SzafirHost version 1.2.1. Users are strongly advised to update immediately. The vulnerability was reported to CERT Polska, which coordinated the disclosure process [2].
AI Insight generated by deepseek/deepseek-v4-flash-20260423 on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <1.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.