PT-2026-26687 · Squidowl · Halloy

Published

2026-03-20

·

Updated

2026-03-20

·

CVE-2026-32733

CVSS v4.0

8.7

High

AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, the DCC receive flow did not sanitize filenames from incoming DCC SEND requests. A remote IRC user could send a filename with path traversal sequences like ../../.ssh/authorized keys and the file would be written outside the user's configured save directory. With auto-accept enabled this required zero interaction from the victim. Starting with commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, all identified code paths sanitize filenames through a shared sanitize filename function.

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-32733

Affected Products

Halloy