The Watchdog Bites Back: CVE-2026-22871 in DataDog GuardDog
Jan 14, 2026·5 min read·10 visits
Executive Summary (TL;DR)
GuardDog, a tool meant to identify malicious Python packages, contained a logic flaw in how it extracted ZIP archives. By misusing `os.path.join` and `zipfile.extract`, it allowed malicious packages to break out of the temporary sandbox and write files anywhere on the file system. This grants attackers RCE on the machines of security researchers and CI/CD pipelines scanning their code.
A critical path traversal vulnerability in GuardDog's archive extraction logic allows malicious PyPI packages to overwrite arbitrary files on the host system, turning the security scanner into an attack vector.
Official Patches
Fix Analysis (1)
Technical Appendix
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:NAffected Systems
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
GuardDog DataDog | < 2.7.1 | 2.7.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-22 |
| Attack Vector | Network / Local (Malicious File) |
| CVSS v4.0 | 8.7 (High) |
| Impact | Arbitrary File Overwrite / RCE |
| Vulnerable API | zipfile.ZipFile.extract |
| Patch Status | Fixed in 2.7.1 |
MITRE ATT&CK Mapping
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Known Exploits & Detection
Vulnerability Timeline
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.