PT-2026-35912 · Ollama · Ollama

Bartłomiej Dmitruk

·

Published

2026-04-29

·

Updated

2026-05-10

·

CVE-2026-42249

CVSS v4.0

7.7

High

VectorAV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
Name of the Vulnerable Software and Affected Versions Ollama for Windows versions 0.12.10 through 0.17.5
Description The update mechanism in Ollama for Windows allows Remote Code Execution due to improper handling of attacker-controlled HTTP response headers. The application constructs local file paths using values from these headers without validation, passing them to the filepath.Join() function. This enables path traversal using sequences like ../ to write files outside the intended update staging directory. An attacker capable of influencing update responses can write arbitrary executables to locations accessible to the current user, such as the Windows Startup directory. When combined with a lack of signature verification for updates, malicious payloads can be delivered, written to sensitive locations, and executed automatically and persistently without user interaction, as the software performs silent automatic updates.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-42249

Affected Products

Ollama