Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Junrar Project
Junrar Project junrar |
|
| CPEs | cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Junrar Project
Junrar Project junrar |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Junrar
Junrar junrar |
|
| Vendors & Products |
Junrar
Junrar junrar |
Thu, 26 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue. | |
| Title | Junrar has arbitrary file write due to backslash path traversal bypass in LocalFolderExtractor on Linux/Unix | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T22:20:03.765Z
Reserved: 2026-02-25T15:28:40.648Z
Link: CVE-2026-28208
No data.
Status : Analyzed
Published: 2026-02-26T23:16:35.440
Modified: 2026-02-27T17:24:18.280
Link: CVE-2026-28208
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:03:55Z
Weaknesses