CVE-2025-4748: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Erlang OTP
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
AI Analysis
Technical Summary
CVE-2025-4748 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This specific issue affects the Erlang Open Telecom Platform (OTP), particularly within the standard library (stdlib) modules responsible for handling ZIP file operations. The vulnerable functions include zip:unzip/1, zip:unzip/2, zip:extract/1, and zip:extract/2, unless the 'memory' option is explicitly passed to these functions. The vulnerability allows an attacker to perform absolute path traversal, enabling unauthorized file manipulation such as overwriting or extracting files outside the intended directory boundaries. This can lead to unauthorized file creation, modification, or deletion on the host system. The affected versions span a wide range of OTP releases, from OTP 17.0 through OTP 28.0.1, including specific patch versions 27.3.4.1 and 26.2.5.13, corresponding to stdlib versions 2.0 through 7.0.1 and related patch versions. The vulnerability arises because the ZIP extraction routines do not properly sanitize or restrict file paths within ZIP archives, allowing crafted archives to escape the target extraction directory. The CVSS 4.0 base score is 4.8, reflecting a medium severity with local attack vector, low attack complexity, no privileges required, but user interaction needed. The impact on confidentiality and integrity is low to limited, with some impact on availability possible if critical files are overwritten. No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating that mitigation may rely on configuration or workaround until a fix is released.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which Erlang OTP is used within their software stacks, particularly in telecommunications, messaging platforms, or backend services that process ZIP files using the vulnerable stdlib modules. Exploitation could allow attackers with local access or the ability to trick users into processing malicious ZIP files to manipulate files on the system, potentially leading to data corruption, service disruption, or privilege escalation if critical system files are targeted. While the vulnerability requires local access or user interaction, it poses a risk in environments where untrusted ZIP files are processed automatically or by privileged services. This could affect service availability and data integrity, impacting business continuity and compliance with data protection regulations such as GDPR if sensitive data is compromised or systems are disrupted. The absence of known exploits reduces immediate risk, but the broad range of affected versions and the common use of Erlang in European telecom and software sectors mean organizations should proactively assess exposure.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Audit all systems and applications to identify usage of Erlang OTP versions between 17.0 and 28.0.1, focusing on components that handle ZIP file extraction via stdlib modules. 2) Where possible, configure applications to use the 'memory' option when invoking zip:unzip or zip:extract functions, as this option is noted to mitigate the vulnerability by avoiding file system extraction. 3) Implement strict input validation and sandboxing for any ZIP files processed, ensuring that untrusted archives are handled in isolated environments to prevent unauthorized file system access. 4) Monitor Erlang OTP vendor channels for official patches or updates addressing CVE-2025-4748 and plan timely deployment. 5) Educate users and administrators about the risks of processing untrusted ZIP files and enforce policies to limit such actions. 6) Employ file integrity monitoring on critical systems to detect unauthorized file changes that could result from exploitation. 7) Consider network segmentation and access controls to limit local access to vulnerable systems, reducing the attack surface. These measures go beyond generic advice by focusing on configuration options, operational controls, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Italy, Spain
CVE-2025-4748: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Erlang OTP
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-4748 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This specific issue affects the Erlang Open Telecom Platform (OTP), particularly within the standard library (stdlib) modules responsible for handling ZIP file operations. The vulnerable functions include zip:unzip/1, zip:unzip/2, zip:extract/1, and zip:extract/2, unless the 'memory' option is explicitly passed to these functions. The vulnerability allows an attacker to perform absolute path traversal, enabling unauthorized file manipulation such as overwriting or extracting files outside the intended directory boundaries. This can lead to unauthorized file creation, modification, or deletion on the host system. The affected versions span a wide range of OTP releases, from OTP 17.0 through OTP 28.0.1, including specific patch versions 27.3.4.1 and 26.2.5.13, corresponding to stdlib versions 2.0 through 7.0.1 and related patch versions. The vulnerability arises because the ZIP extraction routines do not properly sanitize or restrict file paths within ZIP archives, allowing crafted archives to escape the target extraction directory. The CVSS 4.0 base score is 4.8, reflecting a medium severity with local attack vector, low attack complexity, no privileges required, but user interaction needed. The impact on confidentiality and integrity is low to limited, with some impact on availability possible if critical files are overwritten. No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating that mitigation may rely on configuration or workaround until a fix is released.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which Erlang OTP is used within their software stacks, particularly in telecommunications, messaging platforms, or backend services that process ZIP files using the vulnerable stdlib modules. Exploitation could allow attackers with local access or the ability to trick users into processing malicious ZIP files to manipulate files on the system, potentially leading to data corruption, service disruption, or privilege escalation if critical system files are targeted. While the vulnerability requires local access or user interaction, it poses a risk in environments where untrusted ZIP files are processed automatically or by privileged services. This could affect service availability and data integrity, impacting business continuity and compliance with data protection regulations such as GDPR if sensitive data is compromised or systems are disrupted. The absence of known exploits reduces immediate risk, but the broad range of affected versions and the common use of Erlang in European telecom and software sectors mean organizations should proactively assess exposure.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Audit all systems and applications to identify usage of Erlang OTP versions between 17.0 and 28.0.1, focusing on components that handle ZIP file extraction via stdlib modules. 2) Where possible, configure applications to use the 'memory' option when invoking zip:unzip or zip:extract functions, as this option is noted to mitigate the vulnerability by avoiding file system extraction. 3) Implement strict input validation and sandboxing for any ZIP files processed, ensuring that untrusted archives are handled in isolated environments to prevent unauthorized file system access. 4) Monitor Erlang OTP vendor channels for official patches or updates addressing CVE-2025-4748 and plan timely deployment. 5) Educate users and administrators about the risks of processing untrusted ZIP files and enforce policies to limit such actions. 6) Employ file integrity monitoring on critical systems to detect unauthorized file changes that could result from exploitation. 7) Consider network segmentation and access controls to limit local access to vulnerable systems, reducing the attack surface. These measures go beyond generic advice by focusing on configuration options, operational controls, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- EEF
- Date Reserved
- 2025-05-15T08:36:54.783Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684ffa37a8c921274384024b
Added to database: 6/16/2025, 11:04:23 AM
Last enriched: 9/3/2025, 12:40:29 AM
Last updated: 9/26/2025, 10:15:14 PM
Views: 32
Related Threats
HTTP/2 2.0 - Denial Of Service (DOS)
MediumMbed TLS 3.6.4 - Use-After-Free
MediumConcrete CMS 9.4.3 - Stored XSS
MediumELEX WooCommerce WordPress Plugin 1.4.3 - SQL Injection
MediumdotCMS 25.07.02-1 - Authenticated Blind SQL Injection
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.