SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass. | |
| Title | Code execution vulnerability in SWIG code generation in cmd/go | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-04-08T01:06:57.893Z
Reserved: 2026-02-17T19:57:28.435Z
Link: CVE-2026-27140
No data.
Status : Received
Published: 2026-04-08T02:16:02.887
Modified: 2026-04-08T02:16:02.887
Link: CVE-2026-27140
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.