Home

Description

Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.

PUBLISHED Reserved 2026-03-07 | Published 2026-03-10 | Updated 2026-03-12 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 7.0.6
affected

References

github.com/...appium/security/advisories/GHSA-rfx7-4xw3-gh4m exploit

github.com/...appium/security/advisories/GHSA-rfx7-4xw3-gh4m

github.com/appium/appium/releases/tag/@appium/support@7.0.6

cve.org (CVE-2026-30973)

nvd.nist.gov (CVE-2026-30973)

Download JSON