We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4748

Absolute path traversal in zip:unzip/1,2



Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.

Reserved 2025-05-15 | Published 2025-06-16 | Updated 2025-06-16 | Assigner EEF


MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unknown

pkg:otp/stdlib@2.0 before pkg:otp/stdlib@*
affected

17.0 before *
affected

07b8f441ca711f9812fad9e9115bab3c3aa92f79 before *
affected

Credits

Wander Nauta finder

Lukas Backström remediation developer

Björn Gustavsson remediation reviewer

References

github.com/...ng/otp/security/advisories/GHSA-9g37-pgj9-wrhc vendor-advisory

www.erlang.org/doc/system/versions.html

github.com/erlang/otp/pull/9941 patch

cve.org (CVE-2025-4748)

nvd.nist.gov (CVE-2025-4748)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4748

Support options

Helpdesk Chat, Email, Knowledgebase