CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0CVE-2026-41245 – Junrar: Path Traversal (Zip-Slip) via Sibling Directory Name Prefix
https://notcve.org/view.php?id=CVE-2026-41245
20 Apr 2026 — Junrar is an open source java RAR archive library. Prior to version 7.5.10, a path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content into sibling directories when a crafted RAR archive is extracted. Version 7.5.10 fixes the issue. • https://github.com/junrar/junrar/commit/d77e9a83eb721cd51f9c23d7869d0e6ad7f952d7 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1CVE-2026-28208 – Junrar has arbitrary file write due to backslash path traversal bypass in LocalFolderExtractor on Linux/Unix
https://notcve.org/view.php?id=CVE-2026-28208
26 Feb 2026 — Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue. Junrar es una biblioteca de archivo RAR de Java de código abie... • https://github.com/junrar/junrar/commit/947ff1d33f00f940aa68ae2593500291d799d954 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1CVE-2022-23596 – Infinite loop in junrar
https://notcve.org/view.php?id=CVE-2022-23596
01 Feb 2022 — Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible. • https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1CVE-2018-12418
https://notcve.org/view.php?id=CVE-2018-12418
14 Jun 2018 — Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files. Archive.java en Junrar en versiones anteriores a la 1.0.1, tal y como se emplea en Apache Tika y otros productos, se ha visto afectado por una vulnerabilidad de denegación de servicio (DoS) debido a un bucle infinito al gestionar archivos RAR corruptos. • https://github.com/tafamace/CVE-2018-12418 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
