Symlink Attack Affecting coreutils package, versions <0.7.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-COREUTILS-16297957
  • published26 Apr 2026
  • disclosed23 Apr 2026
  • creditZellic

Introduced: 23 Apr 2026

NewCVE-2026-35365  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade coreutils to version 0.7.0 or higher.

Overview

Affected versions of this package are vulnerable to Symlink Attack in the mv process when handling directory trees containing symbolic links during moves across filesystem boundaries. An attacker can cause resource exhaustion, duplication of sensitive data, or infinite recursion by crafting symlinks that point to large external directories or create symlink loops.

CVSS Base Scores

version 4.0
version 3.1