2026-05-12 19:9CVE-2026-8052HashiCorp
PUBLISHED5.2CWE-59

Nomad's exec2 task driver vulnerable to arbitrary file read/write on client host through symlink attack

HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-8052) is fixed in version 0.1.2 of the exec2 task driver.

Problem type

Affected products

HashiCorp

Shared library

< 0.1.2 - AFFECTED

References

GitHub Security Advisories

GHSA-wqwc-x3rc-2xw6

HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write...

https://github.com/advisories/GHSA-wqwc-x3rc-2xw6

HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-8052) is fixed in version 0.1.2 of the exec2 task driver.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-8052
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-8052",
    "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
    "assignerShortName": "HashiCorp",
    "dateUpdated": "2026-05-12T20:22:44.939Z",
    "dateReserved": "2026-05-06T18:39:30.181Z",
    "datePublished": "2026-05-12T19:09:15.248Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
        "shortName": "HashiCorp",
        "dateUpdated": "2026-05-12T19:09:15.248Z"
      },
      "title": "Nomad's exec2 task driver vulnerable to arbitrary file read/write on client host through symlink attack",
      "descriptions": [
        {
          "lang": "en",
          "value": "HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-8052) is fixed in version 0.1.2 of the exec2 task driver.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-8052) is fixed in version 0.1.2 of the exec2 task driver.</p><br/>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "HashiCorp",
          "product": "Shared library",
          "platforms": [
            "64 bit",
            "32 bit",
            "x86",
            "ARM",
            "MacOS",
            "Windows",
            "Linux"
          ],
          "repo": "https://github.com/hashicorp/nomad-driver-exec2",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0.1.0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "0.1.2"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-59: Improper Link Resolution Before File Access (Link Following)",
              "cweId": "CWE-59",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://discuss.hashicorp.com/t/hcsec-2026-13-nomads-exec2-task-driver-vulnerable-to-arbitrary-file-read-write-on-client-host-through-symlink-attack/77415"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-132",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-132: Symlink Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
            "baseScore": 6,
            "baseSeverity": "MEDIUM"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This issue was identified by the Nomad engineering team in conjunction with Alex Manson (Aiven / NeuroWinter)."
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-05-12T20:22:44.939Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}