malcontent is software for discovering supply-chain compromises through context, differential analysis, and YARA. Prior to version 1.21.0, malcontent would remove nested archives which failed to extract which could potentially leave malicious content. A better approach is to preserve these archives so that malcontent can attempt a best-effort scan of the archive bytes. Version 1.21.0 fixes the issue.
History

Tue, 03 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Chainguard
Chainguard malcontent
CPEs cpe:2.3:a:chainguard:malcontent:*:*:*:*:*:*:*:*
Vendors & Products Chainguard
Chainguard malcontent
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Mon, 02 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Chainguard-dev
Chainguard-dev malcontent
Vendors & Products Chainguard-dev
Chainguard-dev malcontent

Fri, 27 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description malcontent is software for discovering supply-chain compromises through context, differential analysis, and YARA. Prior to version 1.21.0, malcontent would remove nested archives which failed to extract which could potentially leave malicious content. A better approach is to preserve these archives so that malcontent can attempt a best-effort scan of the archive bytes. Version 1.21.0 fixes the issue.
Title malcontent's nested archive extraction failure can drop content from scan inputs
Weaknesses CWE-703
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-02-27T21:28:06.258Z

Updated: 2026-03-02T22:01:48.514Z

Reserved: 2026-02-27T15:33:57.289Z

Link: CVE-2026-28407

cve-icon Vulnrichment

Updated: 2026-03-02T22:01:44.254Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T22:16:23.680

Modified: 2026-03-03T18:23:37.350

Link: CVE-2026-28407

cve-icon Redhat

No data.