{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-41326","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-04-20T14:01:46.672Z","datePublished":"2026-04-24T18:46:21.993Z","dateUpdated":"2026-05-13T05:17:44.571Z"},"containers":{"cna":{"title":"Kata Containers: CopyFile Policy Subversion via Symlinks","problemTypes":[{"descriptions":[{"cweId":"CWE-61","lang":"en","description":"CWE-61: UNIX Symbolic Link (Symlink) Following","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/kata-containers/kata-containers/security/advisories/GHSA-q49m-57vm-c8cc","tags":["x_refsource_CONFIRM"],"url":"https://github.com/kata-containers/kata-containers/security/advisories/GHSA-q49m-57vm-c8cc"},{"name":"https://github.com/kata-containers/kata-containers/commit/1b9e49eb2763aa6ea6a99b276d3ff5e2c7f658f2","tags":["x_refsource_MISC"],"url":"https://github.com/kata-containers/kata-containers/commit/1b9e49eb2763aa6ea6a99b276d3ff5e2c7f658f2"}],"affected":[{"vendor":"kata-containers","product":"kata-containers","versions":[{"version":">= 3.4.0, < 3.29.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-05-04T16:03:37.932Z"},"descriptions":[{"lang":"en","value":"Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. From v3.4.0 to v3.28.0, an oversight in the CopyFile policy (and perhaps the CopyFile handler) allows untrusted hosts to write to arbitrary locations inside the guest workload image. This can be used to overwrite binaries inside the guest and exfiltrate data from containers; even those running inside CVMs. This vulnerability is fixed in v3.29.0."}],"source":{"advisory":"GHSA-q49m-57vm-c8cc","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/kata-containers/kata-containers/security/advisories/GHSA-q49m-57vm-c8cc","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-27T13:43:48.851429Z","id":"CVE-2026-41326","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-27T13:43:53.436Z"}},{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2026/05/13/2"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-05-13T05:17:44.571Z"}}]}}