CVE-2026-32885 | DDEV up to 1.25.1 pkg/archive/archive.go Untar/Unzip path traversal (GHSA-x2xq-qhjf-5mvg / EUVD-2026-25049)
VulDBArchived Apr 22, 2026✓ Full text saved
A vulnerability was found in DDEV up to 1.25.1 . It has been rated as critical . This affects the function Untar/Unzip of the file pkg/archive/archive.go . Performing a manipulation results in path traversal. This vulnerability is reported as CVE-2026-32885 . The attack is possible to be carried out remotely. No exploit exists. Upgrading the affected component is advised.
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-359038 · CVE-2026-32885 · GHSA-X2XQ-QHJF-5MVG
DDEV UP TO 1.25.1 PKG/ARCHIVE/ARCHIVE.GO UNTAR/UNZIP PATH TRAVERSAL
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
6.3 $0-$5k 3.76
Summaryinfo
A vulnerability categorized as critical has been discovered in DDEV up to 1.25.1. This impacts the function Untar/Unzip of the file pkg/archive/archive.go. Executing a manipulation can lead to path traversal. This vulnerability appears as CVE-2026-32885. The attack may be performed from remote. There is no available exploit. It is advisable to upgrade the affected component.
Detailsinfo
A vulnerability classified as critical was found in DDEV up to 1.25.1. This vulnerability affects the function Untar/Unzip of the file pkg/archive/archive.go. The manipulation with an unknown input leads to a path traversal vulnerability. The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. As an impact it is known to affect integrity, and availability. CVE summarizes:
DDEV is an open-source tool for running local web development environments for PHP and Node.js. Versions prior to 1.25.2 have unsanitized extraction in both `Untar()` and `Unzip()` functions in `pkg/archive/archive.go`. Downloads and extracts archives from remote sources without path validation. Version 1.25.2 patches the issue.
The advisory is available at github.com. This vulnerability was named CVE-2026-32885 since 03/16/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1006 by the MITRE ATT&CK project.
Upgrading to version 1.25.2 eliminates this vulnerability. The upgrade is hosted for download at github.com.
The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2026-25049).
Productinfo
Name
DDEV
Version
1.25.0
1.25.1
Website
Product: https://github.com/ddev/ddev/
CPE 2.3info
🔒
🔒
CPE 2.2info
🔒
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3info
VulDB Meta Base Score: 6.5
VulDB Meta Temp Score: 6.3
VulDB Base Score: 6.5
VulDB Temp Score: 6.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 6.5
CNA Vector (GitHub_M): 🔒
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Path traversal
CWE: CWE-22
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Upgrade: DDEV 1.25.2
Timelineinfo
03/16/2026 CVE reserved
04/22/2026 +36 days Advisory disclosed
04/22/2026 +0 days VulDB entry created
04/22/2026 +0 days VulDB entry last update
Sourcesinfo
Product: github.com
Advisory: GHSA-x2xq-qhjf-5mvg
Status: Confirmed
CVE: CVE-2026-32885 (🔒)
GCVE (CVE): GCVE-0-2026-32885
GCVE (VulDB): GCVE-100-359038
EUVD: 🔒
Entryinfo
Created: 04/22/2026 20:19
Updated: 04/22/2026 21:25
Changes: 04/22/2026 20:19 (66), 04/22/2026 21:25 (1)
Complete: 🔍
Cache ID: 99:433:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸