OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking
High severity
GitHub Reviewed
Published
Feb 2, 2026
in
open-telemetry/opentelemetry-go
•
Updated Feb 3, 2026
Package
Affected versions
>= 1.21.0, <= 1.39.0
Patched versions
1.40.0
Description
Published to the GitHub Advisory Database
Feb 2, 2026
Reviewed
Feb 2, 2026
Published by the National Vulnerability Database
Feb 2, 2026
Last updated
Feb 3, 2026
Impact
The OpenTelemetry Go SDK in version
v1.20.0-1.39.0is vulnerable to Path Hijacking (Untrusted Search Paths) on macOS/Darwin systems. The resource detection code insdk/resource/host_id.goexecutes theioregsystem command using a search path. An attacker with the ability to locally modify the PATH environment variable can achieve Arbitrary Code Execution (ACE) within the context of the application.Patches
This has been patched in d45961b, which was released with
v1.40.0.References
References