Radare2 Path Traversal Flaw: Local Attackers Can Delete Arbitrary Directories

Radare2 Path Traversal Flaw: Local Attackers Can Delete Arbitrary Directories

The National Vulnerability Database has disclosed CVE-2026-6940, a critical path traversal vulnerability affecting radare2 versions prior to 6.1.4. This flaw allows local attackers with UI interaction to recursively delete arbitrary directories by manipulating project deletion. By crafting absolute paths that escape the intended project directory, an attacker can cause the tool to delete directories outside its scope, leveraging the permissions of the running radare2 process.

This vulnerability, classified as HIGH severity with a CVSS score of 7.1, presents a significant risk to system integrity and availability. While affected products beyond the radare2 tool itself are not specified, any environment utilizing this reverse engineering framework could be at risk. The CWE-22 classification highlights the classic directory traversal nature of the exploit, where input validation failures lead to unintended file system access.

What This Means For You

  • If your organization uses the radare2 framework, immediately review your version. For any installation running radare2 prior to 6.1.4, prioritize patching or upgrading to the latest version to mitigate the risk of local privilege escalation leading to data destruction. Audit logs for unusual directory deletion activities associated with the radare2 process.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-6940 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1485 Impact

CVE-2026-6940 - Radare2 Arbitrary Directory Deletion via Path Traversal

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6940 Vulnerability CVE-2026-6940
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 00:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

OpenShell Mirror Mode Allows Arbitrary Code Execution

CVE-2026-41355 — OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror...

vulnerabilityCVEhigh-severitycode-executioncwe-829
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 4 IOCs /⚙ 3 Sigma

OpenClaw: High-Severity Access Control Bypass Looms

CVE-2026-41353 — OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile...

vulnerabilityCVEhigh-severitycwe-472
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma

OpenClaw RCE: Paired Nodes Bypass Auth, Allow Arbitrary Commands

CVE-2026-41352 — OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with...

vulnerabilityCVEhigh-severityremote-code-executioncwe-862
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 3 Sigma