Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/MontFerret/ferret
  4. ›
  5. CVE-2026-34783

CVE-2026-34783: Ferret: Path Traversal in IO::FS::WRITE allows arbitrary file write when scraping malicious websites

April 1, 2026 (updated April 6, 2026)

A path traversal vulnerability in Ferret’s IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machine running Ferret. When an operator scrapes a website that returns filenames containing ../ sequences, and uses those filenames to construct output paths (a standard scraping pattern), the attacker controls both the destination path and the file content. This can lead to remote code execution via cron jobs, SSH authorized_keys, shell profiles, or web shells.

References

  • github.com/MontFerret/ferret
  • github.com/MontFerret/ferret/commit/160ebad6bd50f153453e120f6d909f5b83322917
  • github.com/MontFerret/ferret/security/advisories/GHSA-j6v5-g24h-vg4j
  • github.com/advisories/GHSA-j6v5-g24h-vg4j
  • nvd.nist.gov/vuln/detail/CVE-2026-34783

Code Behaviors & Features

Detect and mitigate CVE-2026-34783 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.18.1

Solution

Unfortunately, there is no solution available yet.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-73: External Control of File Name or Path

Source file

go/github.com/MontFerret/ferret/CVE-2026-34783.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 10 Apr 2026 12:18:03 +0000.