CVE-2025-4330 — Path Traversal in Software Foundation Cpython
Severity
7.5HIGHNVD
EPSS
1.0%
top 22.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 3
Latest updateJun 19
Description
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.
You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
4GHSA▶
GHSA-68pj-xrp5-vccj: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file met↗2025-06-03
OSV▶
CVE-2025-4330: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file met↗2025-06-03
OSV▶
CVE-2025-4330: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file met↗2025-06-03
📋Vendor Advisories
4Red Hat
▶
Debian▶
CVE-2025-4330: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou...↗2025