No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getoutline
Getoutline outline |
|
| Vendors & Products |
Getoutline
Getoutline outline |
Mon, 11 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Outline is a service that allows for collaborative documentation. Prior to 1.7.0, ZipHelper.extract computes the extraction path for each entry by passing a full filesystem path through trimFileAndExt, a filename helper that calls path.basename on its input when truncating. When a zip entry's nested path is long enough to push the joined filesystem path over MAX_PATH_LENGTH (4096 bytes), trimFileAndExt silently drops all directory components and returns a bare filename. fs.createWriteStream then opens the file relative to the process working directory instead of inside the extraction sandbox, and the escaped file persists after import cleanup because cleanupExtractedData only removes the temporary extraction directory. This vulnerability is fixed in 1.7.0. | |
| Title | Outline: Zip Extraction Path Escape via PATH_MAX Truncation in Collection Import | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T12:53:57.532Z
Reserved: 2026-05-04T15:17:09.330Z
Link: CVE-2026-43888
Updated: 2026-05-12T12:53:48.194Z
Status : Deferred
Published: 2026-05-11T22:22:13.627
Modified: 2026-05-12T14:50:18.527
Link: CVE-2026-43888
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:00:06Z