2026-05-12 18:59CVE-2026-6959HashiCorp
PUBLISHED5.2CWE-59

Nomad vulnerable to arbitrary file read/write on client host through symlink attack

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.

Problem type

Affected products

HashiCorp

Nomad

< 2.0.1 - AFFECTED

Nomad Enterprise

< 2.0.1 - AFFECTED

References

GitHub Security Advisories

GHSA-3934-423w-4jq3

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and...

https://github.com/advisories/GHSA-3934-423w-4jq3

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-6959
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-6959",
    "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
    "assignerShortName": "HashiCorp",
    "dateUpdated": "2026-05-12T20:16:15.200Z",
    "dateReserved": "2026-04-24T14:29:55.377Z",
    "datePublished": "2026-05-12T18:59:09.029Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
        "shortName": "HashiCorp",
        "dateUpdated": "2026-05-12T18:59:09.029Z"
      },
      "title": "Nomad vulnerable to arbitrary file read/write on client host through symlink attack",
      "descriptions": [
        {
          "lang": "en",
          "value": "HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.</p><br/>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "HashiCorp",
          "product": "Nomad",
          "platforms": [
            "64 bit",
            "32 bit",
            "x86",
            "ARM",
            "MacOS",
            "Windows",
            "Linux"
          ],
          "repo": "https://github.com/hashicorp/nomad",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0.9.0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "2.0.1"
            }
          ]
        },
        {
          "vendor": "HashiCorp",
          "product": "Nomad Enterprise",
          "platforms": [
            "64 bit",
            "32 bit",
            "x86",
            "ARM",
            "MacOS",
            "Windows",
            "Linux"
          ],
          "repo": "https://github.com/hashicorp/nomad",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0.9.0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "2.0.1"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-59: Improper Link Resolution Before File Access (Link Following)",
              "cweId": "CWE-59",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://discuss.hashicorp.com/t/hcsec-2026-14-nomad-arbitrary-file-read-write-on-client-host-through-symlink-attack/77416"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-132",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-132: Symlink Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
            "baseScore": 6,
            "baseSeverity": "MEDIUM"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This issue was identified by Alex Manson (Aiven / NeuroWinter)."
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-05-12T20:16:15.200Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}