Critical RCE Flaw Hits NuGet Gallery Backend

Critical RCE Flaw Hits NuGet Gallery Backend

The National Vulnerability Database (NVD) has issued an advisory for CVE-2026-39399, a critical vulnerability found in NuGet Gallery, the package repository powering nuget.org. This flaw resides within the backend job’s processing of .nuspec files inside NuGet packages. An attacker can craft a malicious .nuspec file, injecting nefarious metadata that could lead to cross-package metadata injection.

This injection isn’t just a nuisance; it’s a gateway to potential remote code execution (RCE) and/or arbitrary blob writes. The root cause? Insufficient input validation, pure and simple. The NVD highlights that the issue is exploitable via URI fragment injection, specifically by using unsanitized package identifiers. This allows an attacker to manipulate the resolved blob path, enabling writes to arbitrary blobs within the storage container—not just .nupkg files. The implications are severe, including potential tampering of existing content. A patch has been committed, identified by 0e80f87628349207cdcaf55358491f8a6f1ca276, so it’s time to get those updates in.

Related ATT&CK Techniques

🛡️ Detection Rules

6 rules · 5 SIEM formats

6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-39399

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-39399 RCE NuGet Gallery backend job handling of .nuspec files
CVE-2026-39399 Code Injection Crafted .nuspec file with malicious metadata leading to cross package metadata injection
CVE-2026-39399 Arbitrary File Write URI fragment injection using unsanitized package identifiers allowing control of resolved blob path
CVE-2026-39399 Input Validation Insufficient input validation in NuGetGallery backend job

Related Posts

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs

Jellyfin RCE: Critical Flaw Chains Arbitrary File Write to Root

CVE-2026-35031 — Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22cwe-187
/CRITICAL /⚑ 5 IOCs