CVE-2026-22871 is a critical severity vulnerability with a CVSS score of 9.8. No known exploits currently, and patches are available.
Lower probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
A path traversal vulnerability exists in GuardDog's safe_extract() function that allows malicious PyPI packages to write arbitrary files outside the intended extraction directory, leading to Arbitrary File Overwrite and Remote Code Execution on systems running GuardDog.
CWE: CWE-22 (Improper Limitation of a Pathname to a Restricted Directory)
File: guarddog/utils/archives.py
elif zipfile.is_zipfile(source_archive):
with zipfile.ZipFile(source_archive, "r") as zip:
for file in zip.namelist():
# Note: zip.extract cleans up any malicious file name
# such as directory traversal attempts This is not the
# case of zipfile.extractall
zip.extract(file, path=os.path.join(target_directory, file)) # ❌ VULNERABLE
The comment about zip.extract() fooled me at first :) then I noticed the os.path.join() call.
The vulnerability stems from incorrect usage of Python's zipfile.ZipFile.extract() API:
path parameter should be the target directory, not a full file pathextract() automatically appends the member name to the pathos.path.join(target_directory, file), GuardDog causes the filename to be appended twiceguarddog pypi scan malicious-pkgImpact depends on how GuardDog is running and under which environment.
| Vendor | Product |
|---|---|
| Datadoghq | Guarddog |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.
Immediate Code Execution
~/.bashrc → executes on next shell~/.profile → executes on loginPersistent Backdoors
~/.ssh/authorized_keys → SSH access/etc/cron.d/malicious → scheduled execution (if root)and more...
Reported by: Charbel (dwbruijn)