We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
Reserved 2025-05-15 | Published 2025-06-16 | Updated 2025-07-04 | Assigner EEFCWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Wander Nauta
Lukas Backström
Björn Gustavsson
github.com/...ng/otp/security/advisories/GHSA-9g37-pgj9-wrhc
www.erlang.org/doc/system/versions.html
github.com/erlang/otp/pull/9941
github.com/...ommit/5a55feec10c9b69189d56723d8f237afa58d5d4f
github.com/...ommit/ba2f2bc5f45fcfd2d6201ba07990a678bbf4cc8f
github.com/...ommit/578d4001575aa7647ea1efd4b2b7e3afadcc99a5
Support options