CVE-2020-26283
Linux Alpine vulnerability analysis and mitigation

Overview

CVE-2020-26283 affects go-ipfs, an open-source golang implementation of IPFS (InterPlanetary File System), which is a global, versioned, peer-to-peer filesystem. The vulnerability was discovered in versions before 0.8.0, where control characters were not properly escaped from console output. This issue was disclosed on March 24, 2021, and has been fixed in version 0.8.0 (GitHub Advisory).

Technical details

The vulnerability stems from the lack of proper escaping of control characters in the console output functionality. When displaying user-controlled input in the CLI, the application failed to properly escape non-printable characters and control sequences. This could allow malicious input to manipulate the console output. The issue has been assigned a CVSS v3.1 base score of 6.8 MEDIUM by GitHub, Inc., with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N (NVD).

Impact

The vulnerability could allow an attacker to hide input from the user, potentially leading to users taking unknown, malicious actions. By manipulating the console output through unescaped control characters, attackers could potentially obscure or manipulate the display of important information (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in go-ipfs version 0.8.0. The fix involves implementing proper escaping of non-printable characters and control sequences in console output. Users are advised to upgrade to version 0.8.0 or later to address this security issue. The patch was implemented through pull request #7831, which adds functionality to escape non-printable characters in user output (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Linux Alpine vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59030HIGH7.5
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-66293HIGH7.1
  • OpenJDK JDKOpenJDK JDK
  • java-25-openjdk
NoYesDec 03, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • gitaly-fips-18.6
NoYesDec 03, 2025
CVE-2025-59029MEDIUM5.3
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-66406MEDIUM5
  • WolfiWolfi
  • github.com/smallstep/certificates
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management