Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64346: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaredallard archives

0
Medium
VulnerabilityCVE-2025-64346cvecve-2025-64346cwe-22
Published: Fri Nov 07 2025 (11/07/2025, 05:32:09 UTC)
Source: CVE Database V5
Vendor/Project: jaredallard
Product: archives

Description

archives is a Go library for extracting archives (tar, zip, etc.). Version 1.0.0 does not prevent a malicious user to feed a specially crafted archive to the library causing RCE, modification of files or other malignancies in the context of whatever the user is running this library as, through the program that imports it. Severity depends on user permissions, environment and how arbitrary archives are passed. This issue is fixed in version 1.0.1.

AI-Powered Analysis

AILast updated: 11/07/2025, 05:58:21 UTC

Technical Analysis

CVE-2025-64346 is a path traversal vulnerability (CWE-22) found in the 'archives' Go library developed by jaredallard, specifically in version 1.0.0 and earlier. The library is used to extract various archive formats like tar and zip. The flaw arises because the library does not properly restrict pathnames within extracted archives, allowing an attacker to craft malicious archives containing files with paths that traverse directories outside the intended extraction folder. This can lead to overwriting or creating files in arbitrary locations on the host system. If exploited, this can result in remote code execution (RCE), unauthorized modification of files, or other malicious actions executed with the privileges of the user running the program that imports this library. The impact severity depends on the permissions of the user context and the environment in which the library is used. For example, if run by a privileged user or in a sensitive environment, the consequences can be severe. The vulnerability does not require user interaction but does require at least low privileges (PR:L) and an attacker to supply a crafted archive. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity. The issue was fixed in version 1.0.1 by properly limiting pathnames to prevent directory traversal. No known exploits are currently reported in the wild. Organizations using this library in their software or services that process untrusted archives should upgrade promptly to avoid exploitation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those that use the 'archives' Go library in applications or services that handle archive files from untrusted or external sources. Successful exploitation could allow attackers to execute arbitrary code or modify critical files, potentially leading to system compromise, data breaches, or service disruptions. The severity is heightened in environments where the library runs with elevated privileges or on critical infrastructure. Industries such as finance, healthcare, and government, which often process large volumes of data and archives, could face operational and reputational damage. Additionally, supply chain software that integrates this library could propagate the vulnerability to downstream users. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is publicly known. The medium CVSS score reflects moderate risk but should not lead to complacency given the potential for privilege escalation and code execution.

Mitigation Recommendations

European organizations should immediately upgrade the 'archives' Go library to version 1.0.1 or later to ensure the vulnerability is patched. Additionally, they should implement strict validation and sanitization of archive files before extraction, including verifying archive contents for suspicious pathnames that attempt directory traversal. Running extraction processes with the least privilege principle is critical to limit potential damage if exploitation occurs. Employ sandboxing or containerization for services that handle untrusted archives to isolate potential impacts. Monitoring and logging archive extraction activities can help detect anomalous behavior indicative of exploitation attempts. Organizations should also review their software supply chain to identify any dependencies on the vulnerable library and coordinate with vendors or internal development teams to apply patches. Finally, raising awareness among developers about secure archive handling practices will help prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.031Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690d86fc82f4da9bb2f8a059

Added to database: 11/7/2025, 5:43:24 AM

Last enriched: 11/7/2025, 5:58:21 AM

Last updated: 11/7/2025, 1:13:44 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats