CVE-2026-22871
Published: 13 January 2026
Description
GuardDog is a CLI tool to identify malicious PyPI packages. Prior to 2.7.1, there is a path traversal vulnerability exists in GuardDog's safe_extract() function that allows malicious PyPI packages to write arbitrary files outside the intended extraction directory, leading to…
more
Arbitrary File Overwrite and Remote Code Execution on systems running GuardDog. This vulnerability is fixed in 2.7.1.
Mitigating Controls (NIST 800-53 r5)AI
Directly counters the path traversal vulnerability by requiring validation of file paths in GuardDog's safe_extract function during PyPI package extraction.
Mitigates the vulnerability through timely flaw remediation by updating GuardDog to version 2.7.1 or later where the issue is fixed.
Limits impact of arbitrary file overwrites and resulting RCE by enforcing least privilege on the GuardDog process, restricting write access to critical system areas.
Security SummaryAI
CVE-2026-22871 is a path traversal vulnerability (CWE-22) in the safe_extract() function of GuardDog, a CLI tool designed to identify malicious PyPI packages. Versions of GuardDog prior to 2.7.1 are affected, allowing malicious PyPI packages to write arbitrary files outside the intended extraction directory during analysis. This flaw enables arbitrary file overwrite and remote code execution on systems running the vulnerable GuardDog instance, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
The vulnerability can be exploited remotely by any unauthenticated attacker with network access to a system running vulnerable GuardDog. By crafting a malicious PyPI package that triggers the path traversal in safe_extract(), the attacker can overwrite critical files or execute arbitrary code on the target system when GuardDog scans the package. No user interaction or privileges are required, making it highly exploitable in environments where GuardDog is used for automated PyPI package scanning.
The GuardDog security advisory (GHSA-xg9w-vg3g-6m68) and the fixing commit (9aa6a725b2c71d537d3c18d1c15621395ebb879c) confirm that the issue is resolved in version 2.7.1. Security practitioners should update to GuardDog 2.7.1 or later to mitigate the vulnerability.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability in the client-side GuardDog tool enables unauthenticated remote code execution and arbitrary file writes when extracting malicious PyPI packages.