{"id":"GO-2026-4871","summary":"Code execution vulnerability in SWIG code generation in cmd/go","details":"SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.","aliases":["BIT-golang-2026-27140","CVE-2026-27140"],"modified":"2026-04-13T08:27:25.964585875Z","published":"2026-04-07T22:53:49Z","related":["CGA-7mq7-fv93-8q6v"],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2026-4871","review_status":"REVIEWED"},"references":[{"type":"FIX","url":"https://go.dev/cl/763768"},{"type":"REPORT","url":"https://go.dev/issue/78335"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"}],"affected":[{"package":{"name":"toolchain","ecosystem":"Go","purl":"pkg:golang/toolchain"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.25.9"},{"introduced":"1.26.0-0"},{"fixed":"1.26.2"}]}],"ecosystem_specific":{"imports":[{"path":"cmd/go"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2026-4871.json"}}],"schema_version":"1.7.5","credits":[{"name":"Juho Forsén of Mattermost"}]}