SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gotoolchain
Gotoolchain cmd/go |
|
| Vendors & Products |
Gotoolchain
Gotoolchain cmd/go |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 |
Wed, 08 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass. | |
| Title | Code execution vulnerability in SWIG code generation in cmd/go | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-04-09T03:55:58.107Z
Reserved: 2026-02-17T19:57:28.435Z
Link: CVE-2026-27140
No data.
Status : Awaiting Analysis
Published: 2026-04-08T02:16:02.887
Modified: 2026-04-08T21:26:35.910
Link: CVE-2026-27140
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:22:27Z
Weaknesses