Creation of Temporary File in Directory with Insecure Permissions Affecting opentelemetry.exporter.opentelemetryprotocol package, versions [1.8.0,1.15.3)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Creation of Temporary File in Directory with Insecure Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DOTNET-OPENTELEMETRYEXPORTEROPENTELEMETRYPROTOCOL-16345356
  • published3 May 2026
  • disclosed30 Apr 2026
  • creditUnknown

Introduced: 30 Apr 2026

NewCVE-2026-42191  (opens in a new tab)
CWE-379  (opens in a new tab)

How to fix?

Upgrade OpenTelemetry.Exporter.OpenTelemetryProtocol to version 1.15.3 or higher.

Overview

OpenTelemetry.Exporter.OpenTelemetryProtocol is an OTLP Exporter for OpenTelemetry .NET.

Affected versions of this package are vulnerable to Creation of Temporary File in Directory with Insecure Permissions in the ExperimentalOptions() used in handling disk retry storage for telemetry data, which falls back to writing to a shared temp location when OTEL_DOTNET_EXPERIMENTAL_OTLP_RETRY=disk is set and OTEL_DOTNET_EXPERIMENTAL_OTLP_DISK_RETRY_DIRECTORY_PATH is not configured. An attacker on a multi-user system can inject malicious blob files, access sensitive telemetry data, or cause resource exhaustion by writing or reading files in the shared temporary directory.

Workaround

This vulnerability can be mitigated by configuring a dedicated directory with strict access controls for disk retry storage.

CVSS Base Scores

version 4.0
version 3.1