Appearance
MET-2026-002
SharpCompress (CVE-2026-44788)
Appearance
SharpCompress (CVE-2026-44788)
| Bulletin ID | MET-2026-002 |
|---|---|
| Date (published) | 2026-05-11T00:00:00.000Z |
| Date (last updated) | 2026-05-11T00:00:00.000Z |
| Severity | Informational |
On May 6th, 2026, a vulnerability was published on SharpCompress, a managed C# library for reading and writing common archive formats. The WriteToDirectory() and WriteToDirectoryAsync() extraction helpers do not normalize entry paths before creating directories, allowing a malicious archive to create directories outside the intended extraction root. Combined with TAR symbolic link entries, this can be chained into arbitrary file writes.
All versions of SharpCompress up to and including 0.47.4 are affected. No patched release is available as of this bulletin.
Metaplay infrastructure and product are not affected by this vulnerability.
Metaplay.Cloud but does not call the vulnerable extraction APIs. The only call site, GeolocationExtractionUtil.ExtractFileByNameFromTarGz, walks a .tar.gz archive and copies a single named entry into a MemoryStream; nothing is ever written to the filesystem.None.
As MetaplaySDK is not affected, no action is required. SharpCompress has not published a patched release, so no in-place package version override is available.
To silence the NU1902 build warning emitted by NuGet's security audit for this specific advisory, add a NuGetAuditSuppress entry to the project file. The patch has been tested to apply to MetaplaySDK versions 35 and 36.
<PackageReference Include="SharpCompress" Version="0.40.0" />
+ <!-- Suppress the audit warning for CVE-2026-44788; the vulnerable
+ WriteToDirectory APIs are not called by MetaplaySDK. -->
+ <NuGetAuditSuppress Include="https://github.com/advisories/GHSA-6c8g-7p36-r338" />Security-related questions or concerns can be sent to security@metaplay.io.
| Date | Description |
|---|---|
| 2026-05-11 | Security Bulletin released |