We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4330

Extraction filter bypass for linking outside extraction directory



Description

Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

Reserved 2025-05-05 | Published 2025-06-03 | Updated 2025-06-05 | Assigner PSF


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 3.9.23
affected

3.10.0 before 3.10.18
affected

3.11.0 before 3.11.13
affected

3.12.0 before 3.12.11
affected

3.13.0 before 3.13.4
affected

3.14.0a1 before 3.14.0
affected

Credits

Caleb Brown (Google) reporter

Petr Viktorin remediation developer

Serhiy Storchaka remediation developer

Hugo van Kemenade remediation reviewer

Łukasz Langa remediation reviewer

Thomas Wouters remediation reviewer

Seth Larson coordinator

References

github.com/python/cpython/issues/135034 issue-tracking

github.com/python/cpython/pull/135037 patch

mail.python.org/.../thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ vendor-advisory

github.com/...ommit/3612d8f51741b11f36f8fb0494d79086bac9390a patch

github.com/...ommit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a patch

gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f mitigation

github.com/...ommit/19de092debb3d7e832e5672cc2f7b788d35951da patch

github.com/...ommit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01 patch

github.com/...ommit/28463dba112af719df1e8b0391c46787ad756dd9 patch

github.com/...ommit/4633f3f497b1ff70e4a35b6fe2c907cbe2d4cb2e patch

github.com/...ommit/9c1110ef6652687d7c55f590f909720eddde965a patch

github.com/...ommit/dd8f187d0746da151e0025c51680979ac5b4cfb1 patch

cve.org (CVE-2025-4330)

nvd.nist.gov (CVE-2025-4330)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4330

Support options

Helpdesk Chat, Email, Knowledgebase