CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 08, 2026

CVE-2026-27140 | cmd-go up to 1.25.8/1.26.1 on Go SWIG File Parser trust boundary violation

VulDB Archived Apr 08, 2026 ✓ Full text saved

A vulnerability, which was classified as critical , has been found in cmd-go up to 1.25.8/1.26.1 on Go. This vulnerability affects unknown code of the component SWIG File Parser . Performing a manipulation results in trust boundary violation. This vulnerability is reported as CVE-2026-27140 . The attack is possible to be carried out remotely. No exploit exists. It is advisable to upgrade the affected component.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-356008 · CVE-2026-27140 · GCVE-0-2026-27140 CMD-GO UP TO 1.25.8/1.26.1 ON GO SWIG FILE PARSER TRUST BOUNDARY VIOLATION HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 7.0 $0-$5k 0.58+ Summaryinfo A vulnerability, which was classified as critical, was found in cmd-go up to 1.25.8/1.26.1 on Go. This issue affects some unknown processing of the component SWIG File Parser. Executing a manipulation can lead to trust boundary violation. This vulnerability appears as CVE-2026-27140. The attack may be performed from remote. There is no available exploit. You should upgrade the affected component. Detailsinfo A vulnerability has been found in cmd-go up to 1.25.8/1.26.1 on Go and classified as critical. This vulnerability affects some unknown functionality of the component SWIG File Parser. The manipulation with an unknown input leads to a trust boundary violation vulnerability. The CWE definition for the vulnerability is CWE-501. The product mixes trusted and untrusted data in the same data structure or structured message. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes: SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass. This vulnerability was named CVE-2026-27140 since 02/17/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. Upgrading to version 1.25.9 or 1.26.2 eliminates this vulnerability. Productinfo Name cmd-go Version 1.25.0 1.25.1 1.25.2 1.25.3 1.25.4 1.25.5 1.25.6 1.25.7 1.25.8 1.26.0 1.26.1 CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 7.3 VulDB Meta Temp Score: 7.0 VulDB Base Score: 7.3 VulDB Temp Score: 7.0 VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Trust boundary violation CWE: CWE-501 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: cmd-go 1.25.9/1.26.2 Timelineinfo 02/17/2026 CVE reserved 04/08/2026 +49 days Advisory disclosed 04/08/2026 +0 days VulDB entry created 04/08/2026 +0 days VulDB entry last update Sourcesinfo Status: Confirmed CVE: CVE-2026-27140 (🔒) GCVE (CVE): GCVE-0-2026-27140 GCVE (VulDB): GCVE-100-356008 Entryinfo Created: 04/08/2026 08:01 Changes: 04/08/2026 08:01 (52) Complete: 🔍 Cache ID: 99:BD6:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗