Directory Traversal Affecting dagdotdev package, versions <0.0.20-r6


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.08% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-WOLFILATEST-DAGDOTDEV-15702262
  • published20 Mar 2026
  • disclosed4 Feb 2026

Introduced: 4 Feb 2026

CVE-2026-25121  (opens in a new tab)
CWE-23  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade Wolfi dagdotdev to version 0.0.20-r6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dagdotdev package and not the dagdotdev package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, a path traversal vulnerability was discovered in apko's dirFS filesystem abstraction. An attacker who can supply a malicious APK package (e.g., via a compromised or typosquatted repository) could create directories or symlinks outside the intended installation root. The MkdirAll, Mkdir, and Symlink methods in pkg/apk/fs/rwosfs.go use filepath.Join() without validating that the resulting path stays within the base directory. This issue has been patched in version 1.1.1.