CVE-2025-64346: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaredallard archives
archives is a Go library for extracting archives (tar, zip, etc.). Version 1.0.0 does not prevent a malicious user to feed a specially crafted archive to the library causing RCE, modification of files or other malignancies in the context of whatever the user is running this library as, through the program that imports it. Severity depends on user permissions, environment and how arbitrary archives are passed. This issue is fixed in version 1.0.1.
AI Analysis
Technical Summary
CVE-2025-64346 is a path traversal vulnerability classified under CWE-22 found in the 'archives' Go library maintained by jaredallard, specifically in version 1.0.0 and earlier. This library is used for extracting various archive formats such as tar and zip. The vulnerability arises because the library does not properly restrict pathname traversal sequences in archive entries, allowing an attacker to craft archive files that, when extracted, can write files outside the intended extraction directory. This can lead to remote code execution (RCE), unauthorized modification of files, or other malicious actions within the security context of the application using the library. The severity of the impact depends heavily on the permissions of the user running the extraction process and the environment setup. For example, if the extraction runs with elevated privileges or in a sensitive environment, the attacker could overwrite critical system or application files, potentially leading to system compromise. The vulnerability requires no user interaction beyond the processing of the malicious archive and can be exploited remotely by supplying a crafted archive file. The issue was addressed and fixed in version 1.0.1 of the library. The CVSS 4.0 vector indicates a network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity, resulting in a medium severity score of 6.0. No known exploits are currently reported in the wild. Organizations using this library in automated or manual archive extraction workflows should be aware of this risk.
Potential Impact
For European organizations, the impact of CVE-2025-64346 can be significant depending on how the 'archives' library is integrated into their software systems. Organizations that automatically process user-supplied or third-party archives—such as cloud service providers, software vendors, and enterprises handling large volumes of compressed data—are at risk of unauthorized file modifications or remote code execution. This could lead to data breaches, system downtime, or lateral movement within networks. The risk is amplified if the extraction process runs with elevated privileges or in critical infrastructure environments. Confidentiality may be compromised if sensitive files are overwritten or replaced, integrity is directly impacted due to unauthorized file modifications, and availability could be affected if critical system files are corrupted. European organizations in sectors like finance, healthcare, and government, which often have strict regulatory requirements for data protection, could face compliance violations and reputational damage if exploited. The medium severity rating suggests a moderate but actionable risk that should be addressed promptly to avoid potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-64346, European organizations should immediately upgrade the 'archives' Go library to version 1.0.1 or later, where the vulnerability is fixed. Additionally, organizations should implement strict validation and sanitization of archive files before extraction, including verifying archive contents do not contain path traversal sequences or unexpected file paths. Running extraction processes with the least privilege necessary reduces the impact of potential exploitation. Employing sandboxing or containerization for archive extraction workflows can further isolate potential damage. Monitoring and logging archive extraction activities can help detect suspicious behavior. Organizations should also review and update their software supply chain and CI/CD pipelines to ensure no vulnerable versions of the library are used. Finally, educating developers and system administrators about secure archive handling practices will reduce the risk of accidental exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-64346: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaredallard archives
Description
archives is a Go library for extracting archives (tar, zip, etc.). Version 1.0.0 does not prevent a malicious user to feed a specially crafted archive to the library causing RCE, modification of files or other malignancies in the context of whatever the user is running this library as, through the program that imports it. Severity depends on user permissions, environment and how arbitrary archives are passed. This issue is fixed in version 1.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-64346 is a path traversal vulnerability classified under CWE-22 found in the 'archives' Go library maintained by jaredallard, specifically in version 1.0.0 and earlier. This library is used for extracting various archive formats such as tar and zip. The vulnerability arises because the library does not properly restrict pathname traversal sequences in archive entries, allowing an attacker to craft archive files that, when extracted, can write files outside the intended extraction directory. This can lead to remote code execution (RCE), unauthorized modification of files, or other malicious actions within the security context of the application using the library. The severity of the impact depends heavily on the permissions of the user running the extraction process and the environment setup. For example, if the extraction runs with elevated privileges or in a sensitive environment, the attacker could overwrite critical system or application files, potentially leading to system compromise. The vulnerability requires no user interaction beyond the processing of the malicious archive and can be exploited remotely by supplying a crafted archive file. The issue was addressed and fixed in version 1.0.1 of the library. The CVSS 4.0 vector indicates a network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity, resulting in a medium severity score of 6.0. No known exploits are currently reported in the wild. Organizations using this library in automated or manual archive extraction workflows should be aware of this risk.
Potential Impact
For European organizations, the impact of CVE-2025-64346 can be significant depending on how the 'archives' library is integrated into their software systems. Organizations that automatically process user-supplied or third-party archives—such as cloud service providers, software vendors, and enterprises handling large volumes of compressed data—are at risk of unauthorized file modifications or remote code execution. This could lead to data breaches, system downtime, or lateral movement within networks. The risk is amplified if the extraction process runs with elevated privileges or in critical infrastructure environments. Confidentiality may be compromised if sensitive files are overwritten or replaced, integrity is directly impacted due to unauthorized file modifications, and availability could be affected if critical system files are corrupted. European organizations in sectors like finance, healthcare, and government, which often have strict regulatory requirements for data protection, could face compliance violations and reputational damage if exploited. The medium severity rating suggests a moderate but actionable risk that should be addressed promptly to avoid potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-64346, European organizations should immediately upgrade the 'archives' Go library to version 1.0.1 or later, where the vulnerability is fixed. Additionally, organizations should implement strict validation and sanitization of archive files before extraction, including verifying archive contents do not contain path traversal sequences or unexpected file paths. Running extraction processes with the least privilege necessary reduces the impact of potential exploitation. Employing sandboxing or containerization for archive extraction workflows can further isolate potential damage. Monitoring and logging archive extraction activities can help detect suspicious behavior. Organizations should also review and update their software supply chain and CI/CD pipelines to ensure no vulnerable versions of the library are used. Finally, educating developers and system administrators about secure archive handling practices will reduce the risk of accidental exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.031Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690d86fc82f4da9bb2f8a059
Added to database: 11/7/2025, 5:43:24 AM
Last enriched: 11/14/2025, 9:17:25 AM
Last updated: 12/22/2025, 6:19:02 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15014: SQL Injection in loganhong php loganSite
MediumCVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01
CriticalCVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalCVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
HighCVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.