Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-40180

CVE-2026-40180: Quarkus OpenAPI Path Traversal Flaw

CVE-2026-40180 is a path traversal vulnerability in Quarkus OpenAPI Generator that allows malicious ZIP archives to write files outside the target directory. This article covers technical details, affected versions, and patches.

Published: April 17, 2026

CVE-2026-40180 Overview

CVE-2026-40180 is a Path Traversal vulnerability in the Quarkus OpenAPI Generator, a Quarkus extension used for generating REST Clients and server stubs. The vulnerability exists in the unzip() method within ApicurioCodegenWrapper.java, which extracts ZIP entries without validating that the resolved file path remains within the intended output directory. This flaw allows attackers to write arbitrary files outside the target directory by crafting malicious ZIP archives containing path traversal sequences.

Critical Impact

Attackers can leverage malicious ZIP archives with path traversal sequences (e.g., ../../malicious.java) to write arbitrary files outside the intended directory, potentially leading to code execution, configuration tampering, or system compromise.

Affected Products

  • Quarkus OpenAPI Generator versions prior to 2.16.0
  • Quarkus OpenAPI Generator LTS versions prior to 2.15.0-lts

Discovery Timeline

  • April 10, 2026 - CVE-2026-40180 published to NVD
  • April 13, 2026 - Last updated in NVD database

Technical Details for CVE-2026-40180

Vulnerability Analysis

The vulnerability stems from inadequate input validation during ZIP file extraction operations. At line 101 of ApicurioCodegenWrapper.java, the destination path is constructed using new File(toOutputDir, entry.getName()) and file content is written immediately without any path canonicalization or boundary checks. This classic Zip Slip vulnerability pattern allows malicious archives to escape the extraction directory through directory traversal sequences embedded in entry names.

The attack exploits the trust placed in ZIP entry names. When a ZIP file contains an entry named with relative path components like ../../etc/malicious.java, the naive file path construction concatenates this with the output directory, resulting in a path that resolves outside the intended extraction location. The immediate write operation following path construction means there is no opportunity for validation before potentially dangerous file operations occur.

Root Cause

The root cause is a missing path validation check in the unzip() method of ApicurioCodegenWrapper.java. The code directly uses entry.getName() from ZIP entries to construct file paths without:

  1. Canonicalizing the resulting path to resolve traversal sequences
  2. Verifying that the canonical path starts with the intended output directory
  3. Rejecting entries containing suspicious path components like ..

This represents a CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) vulnerability where user-controlled input influences file system operations without proper sanitization.

Attack Vector

The attack vector is network-based, requiring an attacker to supply a malicious ZIP archive that will be processed by the vulnerable unzip() method. Exploitation scenarios include:

  1. Supply Chain Attack: An attacker compromises or creates a malicious OpenAPI specification source that provides ZIP archives containing path traversal payloads
  2. Man-in-the-Middle: Intercepting and modifying legitimate ZIP archives in transit to inject malicious entries
  3. Malicious Repository: Hosting crafted archives on repositories that developers might reference during code generation

A successful attack could overwrite critical application files, inject malicious source code that gets compiled into the application, or modify configuration files to alter application behavior.

Detection Methods for CVE-2026-40180

Indicators of Compromise

  • Unexpected files appearing outside expected extraction directories
  • Modified Java source files in project directories that were not manually changed
  • Build artifacts containing unexpected or suspicious code
  • File system audit logs showing writes to paths containing ../ sequences originating from the Quarkus OpenAPI Generator process

Detection Strategies

  • Monitor file system operations during build processes for writes outside designated output directories
  • Implement static analysis on generated code to detect unexpected file modifications
  • Review build logs for any errors or warnings related to path handling during code generation
  • Audit dependency versions to identify use of vulnerable Quarkus OpenAPI Generator versions

Monitoring Recommendations

  • Enable file integrity monitoring on critical project directories and build outputs
  • Configure build environment security controls to restrict file write permissions to designated directories
  • Implement network monitoring to detect suspicious ZIP file downloads during build processes
  • Regularly audit project dependencies using software composition analysis tools

How to Mitigate CVE-2026-40180

Immediate Actions Required

  • Upgrade Quarkus OpenAPI Generator to version 2.16.0 or later immediately
  • For LTS track users, upgrade to version 2.15.0-lts or later
  • Audit existing generated code for any signs of tampering or unexpected modifications
  • Review build environment file system for unauthorized files that may have been written outside expected directories

Patch Information

The vulnerability has been fixed in Quarkus OpenAPI Generator versions 2.16.0 and 2.15.0-lts. The security patches implement proper path validation to ensure extracted files cannot escape the intended output directory. For detailed information about the fixes, refer to the GitHub Security Advisory.

Patch commits are available at:

  • Primary fix commit
  • Additional fix commit

Workarounds

  • If immediate upgrade is not possible, restrict network access during build processes to only trusted sources
  • Implement build-time validation that scans ZIP archives for path traversal sequences before processing
  • Use containerized build environments with restricted file system access to limit the impact of potential exploitation
  • Manually inspect ZIP archives from untrusted sources before allowing them to be processed by the generator
bash
# Update Quarkus OpenAPI Generator in Maven pom.xml
# Change version from vulnerable version to patched version:
# For standard track: update to 2.16.0 or later
# For LTS track: update to 2.15.0-lts or later
mvn versions:use-dep-version -Dincludes=io.quarkiverse.openapi.generator:* -DdepVersion=2.16.0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechQuarkus

  • SeverityHIGH

  • CVSS Score7.7

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Technical References
  • GitHub Commit Change

  • GitHub Commit Update

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2025-66560: Quarkus REST DoS Vulnerability

  • CVE-2025-1634: Quarkus RESTEasy DoS Vulnerability

  • CVE-2024-12225: Quarkus WebAuthn Auth Bypass Vulnerability

  • CVE-2025-1247: Quarkus REST Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English