NuGet Gallery RCE via crafted nuspec file (CVE-2026-39399)
CVE-2026-39399
NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within NuGet packages. An attacker can supply a...
Overview
A critical security vulnerability, CVE-2026-39399, has been identified in the NuGet Gallery, the backend software that powers the public nuget.org repository. The flaw resides in how the gallery’s backend job processes .nuspec files within uploaded NuGet packages. Due to insufficient input validation, an attacker can exploit this to achieve remote code execution (RCE) or write arbitrary data to the storage system.
Vulnerability Details
The vulnerability stems from improper handling of package metadata. An attacker can craft a malicious .nuspec file containing specially designed metadata. This allows for cross-package metadata injection. The core exploit path involves URI fragment injection using unsanitized package identifiers. This flaw gives an attacker control over the resolved blob path in the storage container, enabling writes to arbitrary blobs. This is not limited to package (.nupkg) files, meaning an attacker could potentially tamper with or overwrite existing content in the storage system, leading to a complete compromise of the NuGet Gallery instance.
Impact
With a CVSS score of 9.6 (Critical), this vulnerability poses a severe risk. Successful exploitation could allow an unauthenticated or low-privileged attacker to execute arbitrary code on the server hosting the NuGet Gallery. Additionally, the ability to perform arbitrary blob writes could lead to data corruption, defacement, or the planting of malicious files for further attacks. This vulnerability is not currently listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog, indicating it is not confirmed to be actively exploited in attacks at this time.
Remediation and Mitigation
The issue has been patched. Administrators of self-hosted NuGet Gallery instances must apply the fix immediately.
Primary Action: Patch
Update your NuGet Gallery codebase to include the security fix from commit 0e80f87628349207cdcaf55358491f8a6f1ca276. This is the only complete remediation.
Mitigation Considerations If immediate patching is not possible, consider restricting network access to the gallery’s administrative backend interfaces as a temporary measure. However, patching is the definitive solution. Users of the public nuget.org service are protected, as Microsoft has applied the patch to its infrastructure.
Security Insight
This vulnerability highlights the persistent risk in software supply chain infrastructure, where a single component like a package metadata parser can become a high-impact attack vector. It echoes past incidents where insufficient validation in repository software led to server compromise, underscoring the need for rigorous security testing of all data processing paths in foundational development tools. The high CVSS score reflects the dangerous combination of low attack complexity and high-impact outcomes like RCE and data tampering.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bri...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the sys...
CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11....