Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59825: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in astral-sh tokio-tar

0
Medium
VulnerabilityCVE-2025-59825cvecve-2025-59825cwe-22cwe-61
Published: Tue Sep 23 2025 (09/23/2025, 20:00:44 UTC)
Source: CVE Database V5
Vendor/Project: astral-sh
Product: tokio-tar

Description

astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.3 and earlier of astral-tokio-tar, tar archives may extract outside of their intended destination directory when using the Entry::unpack_in_raw API. Additionally, the Entry::allow_external_symlinks control (which defaults to true) could be bypassed via a pair of symlinks that individually point within the destination but combine to point outside of it. These behaviors could be used individually or combined to bypass the intended security control of limiting extraction to the given directory. This in turn would allow an attacker with a malicious tar archive to perform an arbitrary file write and potentially pivot into code execution. This issue has been patched in version 0.5.4. There is no workaround other than upgrading.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:43:56 UTC

Technical Analysis

CVE-2025-59825 is a path traversal vulnerability affecting the astral-sh project's tokio-tar library, a Rust-based asynchronous tar archive reading and writing tool. Versions prior to 0.5.4 of tokio-tar contain a flaw in the Entry::unpack_in_raw API that allows malicious tar archives to extract files outside the intended destination directory. This occurs due to improper limitation of pathnames (CWE-22) and inadequate handling of symbolic links (CWE-61). Specifically, the Entry::allow_external_symlinks control, which is enabled by default, can be bypassed by crafting a pair of symlinks that individually point within the destination directory but, when combined, resolve to locations outside it. This bypass enables an attacker to write arbitrary files anywhere on the filesystem accessible by the process running the extraction. Such arbitrary file writes can lead to privilege escalation or code execution if critical files are overwritten or malicious binaries/scripts are placed in executable paths. The vulnerability requires no user interaction, no privileges, and has low attack complexity, but local access to supply a malicious tar archive is necessary. The issue was patched in version 0.5.4, and no alternative mitigations exist. The CVSS 4.0 base score is 6.1 (medium severity), reflecting high impact on confidentiality, integrity, and availability due to potential arbitrary file writes, but limited attack vector (local) and no authentication required. No known exploits are reported in the wild as of publication.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to software projects, CI/CD pipelines, or automated systems that utilize the vulnerable tokio-tar library for asynchronous tar archive extraction. Attackers could craft malicious tar files that, when processed by vulnerable versions, overwrite critical configuration files, inject malicious code, or place backdoors, potentially leading to system compromise or lateral movement within networks. Industries relying heavily on Rust-based tooling or custom software development, such as finance, manufacturing, and technology sectors, may be particularly exposed. Given the asynchronous nature of tokio-tar, this vulnerability could be exploited in high-throughput environments, amplifying damage. The lack of required privileges or user interaction means that any automated process handling untrusted tar files is at risk. Additionally, supply chain attacks could leverage this flaw by embedding malicious archives in software distributions. The impact extends to confidentiality (data exposure or tampering), integrity (unauthorized file modification), and availability (disruption via overwriting critical files).

Mitigation Recommendations

The primary and only effective mitigation is to upgrade the tokio-tar library to version 0.5.4 or later, where the vulnerability has been patched. Organizations should audit their codebases and dependencies to identify usage of astral-sh tokio-tar versions below 0.5.4 and update accordingly. For environments where immediate upgrade is not feasible, strict validation and sanitization of tar archives before extraction should be implemented, including rejecting archives containing suspicious symlink chains or path traversal patterns. Running extraction processes with least privilege and within sandboxed or containerized environments can limit the impact of exploitation. Monitoring file system changes during extraction and employing integrity verification mechanisms post-extraction can help detect exploitation attempts. Additionally, organizations should review and harden CI/CD pipelines and automated workflows that handle tar archives to prevent processing untrusted inputs. Finally, maintain awareness of supply chain security to avoid introduction of malicious archives.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-22T14:34:03.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d336ac712f26b964ce8e56

Added to database: 9/24/2025, 12:09:16 AM

Last enriched: 10/1/2025, 12:43:56 AM

Last updated: 10/7/2025, 1:41:17 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats