Cyber Posture

CVE-2026-27606

CriticalPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0040 60.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27606 is a critical-severity Path Traversal (CWE-22) vulnerability in Rollupjs Rollup. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Compromise Software Dependencies and Development Tools (T1195.001); ranked in the top 39.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Compromise Software Dependencies and Development Tools (T1195.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation by patching Rollup to versions 2.80.0, 3.30.0, or 4.59.0, directly eliminating the path traversal vulnerability in file name sanitization.

prevent

Enforces least privilege on processes running Rollup builds, restricting write permissions to prevent overwriting critical system or configuration files via arbitrary file writes.

prevent

Validates inputs such as CLI named inputs, chunk aliases, and plugin configurations to the Rollup build process, blocking path traversal sequences like '../'.

MITRE ATT&CK Enterprise TechniquesAI

T1195.001 Compromise Software Dependencies and Development Tools Initial Access
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise.
Why these techniques?

Arbitrary file write vulnerability in Rollup JavaScript bundler (development tool) enables attackers supplying malicious inputs/plugins to overwrite files during builds in developer/CI/CD pipelines, directly facilitating T1195.001: Compromise Software Dependencies and Development Tools.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization…

more

in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.

Deeper analysisAI

CVE-2026-27606 is an Arbitrary File Write vulnerability via Path Traversal (CWE-22) affecting the Rollup JavaScript module bundler. Versions prior to 2.80.0, 3.30.0, and 4.59.0, including v4.x and the current source, are vulnerable due to insecure file name sanitization in the core engine. This flaw enables attackers to control output filenames through mechanisms such as CLI named inputs, manual chunk aliases, or malicious plugins.

The vulnerability can be exploited by any unauthenticated attacker with the ability to influence a Rollup build process, such as by supplying malicious inputs or plugins to a developer or CI/CD pipeline. By injecting path traversal sequences like "../", the attacker can overwrite arbitrary files on the host filesystem wherever the build process has write permissions. This may lead to persistent Remote Code Execution (RCE) through modification of critical system or user configuration files. The CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects its high severity, network accessibility, and low attack complexity.

Mitigation is provided in Rollup versions 2.80.0, 3.30.0, and 4.59.0, which include patches addressing the file name sanitization issue, as evidenced by the corresponding GitHub commit fixes and release tags. Security practitioners should upgrade affected installations immediately and review build inputs, plugins, and configurations for potential traversal risks.

Details

CWE(s)

Affected Products

rollupjs
rollup
≤ 2.80.0 · 3.0.0 — 3.30.0 · 4.0.0 — 4.59.0

CVEs Like This One

CVE-2026-27704Shared CWE-22
CVE-2026-25121Shared CWE-22
CVE-2026-34728Shared CWE-22
CVE-2026-28827Shared CWE-22
CVE-2025-11849Shared CWE-22
CVE-2026-1811Shared CWE-22
CVE-2026-36760Shared CWE-22
CVE-2026-3179Shared CWE-22
CVE-2025-26753Shared CWE-22
CVE-2026-39308Shared CWE-22

References