Ad

CVE-2026-32733

HIGH CVSS 4.0: 8.7 EPSS 0.02%
Updated Mar 23, 2026
Halloy
Parameter Value
CVSS 8.7 (HIGH)
Affected Versions before 2026.4
Type CWE-22 (Path Traversal)
Vendor Halloy
Public PoC No

Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, the DCC receive flow did not sanitize filenames from incoming `DCC SEND` requests. A remote IRC user could send a filename with path traversal sequences like `../../.ssh/authorized_keys` and the file would be written outside the user's configured `save_directory`.

With auto-accept enabled this required zero interaction from the victim. Starting with commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, all identified code paths sanitize filenames through a shared `sanitize_filename` function.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Halloy Halloy
cpe:2.3:a:halloy:halloy:*:*:*:*:*:*:*:*
<= 2026.4

Related Vulnerabilities