UNIX Symbolic Link (Symlink) Following Affecting coreutils package, versions <0.8.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-COREUTILS-16297952
  • published26 Apr 2026
  • disclosed23 Apr 2026
  • creditZellic

Introduced: 23 Apr 2026

NewCVE-2026-35372  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade coreutils to version 0.8.0 or higher.

Overview

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following due to improper handling of the --no-dereference flag in the ln process. An attacker can cause unauthorized file creation or system misconfiguration by manipulating symbolic links to redirect file creation into sensitive directories when a privileged user or system script uses the affected process.

CVSS Base Scores

version 4.0
version 3.1