LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-27606

CVE-2026-27606 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: February 25, 2026

Rollup - Path Traversal

Published: February 25, 2026Updated: February 25, 2026PoC AvailableRemote Exploitable

Overview

Rollup < 2.80.0, < 3.30.0, and < 4.59.0 contains a path traversal caused by insecure file name sanitization in the core engine, letting attackers write arbitrary files and potentially achieve remote code execution, exploit requires control over output filenames.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 47.5%(Probability of exploitation in next 30 days)

Impact

Attackers can overwrite files on the host filesystem, potentially leading to persistent remote code execution.

Mitigation

Upgrade to versions 2.80.0, 3.30.0, or 4.59.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

šŸ”“ CVE-2026-27606 - Critical (9.8) Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-27606/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-27606
Severity
Critical
CVSS Score
9.8
Type
path_traversal
Status
confirmed
EPSS
47.5%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

47.5%Probability of exploitation in the next 30 days