PT-2026-34804 · Melange · Melange
1Seal
·
Published
2026-04-23
·
Updated
2026-04-28
·
CVE-2026-29051
CVSS v3.1
4.4
Medium
| Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L |
Name of the Vulnerable Software and Affected Versions
melange versions 0.32.0 through 0.43.3
Description
When using the opt-in flag '--persist-lint-results' via 'melange lint' or 'melange build', the software constructs output file paths by joining the '--out-dir' parameter with
arch and pkgname values read from the .PKGINFO control file of the APK. Because these values are not validated for path separators or '..' sequences, an attacker providing a malicious APK to a lint or build pipeline could cause the system to write a JSON lint report to an arbitrary .json path reachable by the process. This can lead to the overwriting of other JSON artifacts on the filesystem. This issue only affects deployments where the '--persist-lint-results' flag is explicitly enabled.Recommendations
Update to version 0.43.4.
As a temporary workaround, do not pass the '--persist-lint-results' flag when linting or building APKs with untrusted .PKGINFO contents.
Run the software as a low-privileged user and confine writes to an isolated directory to limit impact.
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Melange