CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 22, 2026

CVE-2026-32885 | DDEV up to 1.25.1 pkg/archive/archive.go Untar/Unzip path traversal (GHSA-x2xq-qhjf-5mvg / EUVD-2026-25049)

VulDB Archived Apr 22, 2026 ✓ Full text saved

A vulnerability was found in DDEV up to 1.25.1 . It has been rated as critical . This affects the function Untar/Unzip of the file pkg/archive/archive.go . Performing a manipulation results in path traversal. This vulnerability is reported as CVE-2026-32885 . The attack is possible to be carried out remotely. No exploit exists. Upgrading the affected component is advised.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-359038 · CVE-2026-32885 · GHSA-X2XQ-QHJF-5MVG DDEV UP TO 1.25.1 PKG/ARCHIVE/ARCHIVE.GO UNTAR/UNZIP PATH TRAVERSAL HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 6.3 $0-$5k 3.76 Summaryinfo A vulnerability categorized as critical has been discovered in DDEV up to 1.25.1. This impacts the function Untar/Unzip of the file pkg/archive/archive.go. Executing a manipulation can lead to path traversal. This vulnerability appears as CVE-2026-32885. The attack may be performed from remote. There is no available exploit. It is advisable to upgrade the affected component. Detailsinfo A vulnerability classified as critical was found in DDEV up to 1.25.1. This vulnerability affects the function Untar/Unzip of the file pkg/archive/archive.go. The manipulation with an unknown input leads to a path traversal vulnerability. The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. As an impact it is known to affect integrity, and availability. CVE summarizes: DDEV is an open-source tool for running local web development environments for PHP and Node.js. Versions prior to 1.25.2 have unsanitized extraction in both `Untar()` and `Unzip()` functions in `pkg/archive/archive.go`. Downloads and extracts archives from remote sources without path validation. Version 1.25.2 patches the issue. The advisory is available at github.com. This vulnerability was named CVE-2026-32885 since 03/16/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1006 by the MITRE ATT&CK project. Upgrading to version 1.25.2 eliminates this vulnerability. The upgrade is hosted for download at github.com. The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2026-25049). Productinfo Name DDEV Version 1.25.0 1.25.1 Website Product: https://github.com/ddev/ddev/ CPE 2.3info 🔒 🔒 CPE 2.2info 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 6.5 VulDB Meta Temp Score: 6.3 VulDB Base Score: 6.5 VulDB Temp Score: 6.2 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 6.5 CNA Vector (GitHub_M): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Path traversal CWE: CWE-22 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: DDEV 1.25.2 Timelineinfo 03/16/2026 CVE reserved 04/22/2026 +36 days Advisory disclosed 04/22/2026 +0 days VulDB entry created 04/22/2026 +0 days VulDB entry last update Sourcesinfo Product: github.com Advisory: GHSA-x2xq-qhjf-5mvg Status: Confirmed CVE: CVE-2026-32885 (🔒) GCVE (CVE): GCVE-0-2026-32885 GCVE (VulDB): GCVE-100-359038 EUVD: 🔒 Entryinfo Created: 04/22/2026 20:19 Updated: 04/22/2026 21:25 Changes: 04/22/2026 20:19 (66), 04/22/2026 21:25 (1) Complete: 🔍 Cache ID: 99:433:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 22, 2026
    Archived
    Apr 22, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗