melange allows users to build apk packages using declarative pipelines. From version 0.14.0 to before 0.40.3, an attacker who can influence a melange configuration file (e.g., through pull request-driven CI or build-as-a-service scenarios) could read arbitrary files from the host system. The LicensingInfos function in pkg/config/config.go reads license files specified in copyright[].license-path without validating that paths remain within the workspace directory, allowing path traversal via ../ sequences. The contents of the traversed file are embedded into the generated SBOM as license text, enabling exfiltration of sensitive data through build artifacts. This issue has been patched in version 0.40.3.
References
| Link | Resource |
|---|---|
| https://github.com/chainguard-dev/melange/commit/2f95c9f4355ed993f2670bf1bb82d88b0f65e9e4 | Patch |
| https://github.com/chainguard-dev/melange/security/advisories/GHSA-2w4f-9fgg-q2v9 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-04 20:16
Updated : 2026-02-18 15:53
NVD link : CVE-2026-25145
Mitre link : CVE-2026-25145
CVE.ORG link : CVE-2026-25145
JSON object : View
Products Affected
chainguard
- melange
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
