Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. go.opentelemetry.io/obi
  4. ›
  5. CVE-2026-41433

CVE-2026-41433: OpenTelemetry eBPF Instrumentation: Privileged Java agent injection allows arbitrary host file overwrite via untrusted TMPDIR

April 17, 2026 (updated April 27, 2026)

A flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary host files when Java injection is enabled and OBI is running with elevated privileges. The injector trusted TMPDIR from the target process and used unsafe file creation semantics, enabling both filesystem boundary escape and symlink-based file clobbering.

References

  • github.com/advisories/GHSA-8gmg-3w2q-65f4
  • github.com/open-telemetry/opentelemetry-ebpf-instrumentation
  • github.com/open-telemetry/opentelemetry-ebpf-instrumentation/releases/tag/v0.8.0
  • github.com/open-telemetry/opentelemetry-ebpf-instrumentation/security/advisories/GHSA-8gmg-3w2q-65f4
  • nvd.nist.gov/vuln/detail/CVE-2026-41433

Code Behaviors & Features

Detect and mitigate CVE-2026-41433 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.4.0 before 0.8.0

Fixed versions

  • 0.8.0

Solution

Upgrade to version 0.8.0 or above.

Impact 8.4 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')

Source file

go/go.opentelemetry.io/obi/CVE-2026-41433.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:53 +0000.