Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13462: Vulnerability in Python Software Foundation CPython

0
Low
VulnerabilityCVE-2025-13462cvecve-2025-13462
Published: Thu Mar 12 2026 (03/12/2026, 17:59:26 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:31:05 UTC

Technical Analysis

CVE-2025-13462 identifies a vulnerability in the tarfile module of CPython, the reference implementation of the Python programming language maintained by the Python Software Foundation. The tarfile module is used to read and write tar archives, a common archive format. The vulnerability stems from how the module normalizes certain tar header types: specifically, it converts AREGTYPE (regular file type, represented as \x00) blocks to DIRTYPE (directory type) even when processing multi-block members such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. These multi-block members are used in GNU tar archives to store long file names or links that exceed the standard tar header size. This normalization behavior deviates from other tar implementations, potentially causing the tarfile module to misinterpret crafted tar archives. Such misinterpretation could lead to incorrect extraction paths, file overwrites, or logic errors in applications relying on tarfile for archive processing. However, the vulnerability requires local access (attack vector: local), has high attack complexity, and requires partial privileges (low privileges) with no user interaction. The impact is limited to partial integrity compromise without affecting confidentiality or availability. No known exploits have been reported, and no patches have been linked at the time of publication. This issue highlights the importance of consistent handling of archive formats across implementations to prevent subtle security issues.

Potential Impact

The potential impact of CVE-2025-13462 is relatively low due to its limited scope and complexity. Organizations that use Python's tarfile module to process untrusted tar archives could face risks of incorrect archive interpretation, which might lead to overwriting files unintentionally or bypassing security checks that rely on archive metadata. This could affect software deployment, backup restoration, or automated processing pipelines that handle tar archives. However, exploitation requires local access and some privileges, limiting remote attack feasibility. The partial integrity impact means attackers might manipulate file extraction paths or contents but cannot directly compromise confidentiality or availability. Overall, the threat is more relevant in environments where tar archives are processed automatically or where integrity of extracted files is critical. Since no known exploits exist, the immediate risk is low, but organizations should monitor for updates and consider the implications in their specific use cases.

Mitigation Recommendations

To mitigate CVE-2025-13462, organizations should: 1) Monitor official Python Software Foundation channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Implement strict validation and sanitization of tar archives before processing, especially when archives originate from untrusted sources. 3) Use alternative tar processing tools or libraries with consistent and secure handling of multi-block tar members if feasible. 4) Employ sandboxing or containerization for processes that handle tar archives to limit potential damage from misinterpretation. 5) Enforce the principle of least privilege for users and processes that interact with tar archives to reduce the risk of local exploitation. 6) Conduct code reviews and testing for applications relying on tarfile to detect assumptions about archive structure that could be exploited. 7) Consider additional integrity checks post-extraction, such as verifying file hashes or permissions, to detect unexpected modifications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2025-11-19T22:05:07.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b302c82f860ef943d65de2

Added to database: 3/12/2026, 6:15:36 PM

Last enriched: 3/12/2026, 6:31:05 PM

Last updated: 3/14/2026, 2:27:49 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses