Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64346: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaredallard archives

0
Medium
VulnerabilityCVE-2025-64346cvecve-2025-64346cwe-22
Published: Fri Nov 07 2025 (11/07/2025, 05:32:09 UTC)
Source: CVE Database V5
Vendor/Project: jaredallard
Product: archives

Description

archives is a Go library for extracting archives (tar, zip, etc.). Version 1.0.0 does not prevent a malicious user to feed a specially crafted archive to the library causing RCE, modification of files or other malignancies in the context of whatever the user is running this library as, through the program that imports it. Severity depends on user permissions, environment and how arbitrary archives are passed. This issue is fixed in version 1.0.1.

AI-Powered Analysis

AILast updated: 11/14/2025, 09:17:25 UTC

Technical Analysis

CVE-2025-64346 is a path traversal vulnerability classified under CWE-22 found in the 'archives' Go library maintained by jaredallard, specifically in version 1.0.0 and earlier. This library is used for extracting various archive formats such as tar and zip. The vulnerability arises because the library does not properly restrict pathname traversal sequences in archive entries, allowing an attacker to craft archive files that, when extracted, can write files outside the intended extraction directory. This can lead to remote code execution (RCE), unauthorized modification of files, or other malicious actions within the security context of the application using the library. The severity of the impact depends heavily on the permissions of the user running the extraction process and the environment setup. For example, if the extraction runs with elevated privileges or in a sensitive environment, the attacker could overwrite critical system or application files, potentially leading to system compromise. The vulnerability requires no user interaction beyond the processing of the malicious archive and can be exploited remotely by supplying a crafted archive file. The issue was addressed and fixed in version 1.0.1 of the library. The CVSS 4.0 vector indicates a network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity, resulting in a medium severity score of 6.0. No known exploits are currently reported in the wild. Organizations using this library in automated or manual archive extraction workflows should be aware of this risk.

Potential Impact

For European organizations, the impact of CVE-2025-64346 can be significant depending on how the 'archives' library is integrated into their software systems. Organizations that automatically process user-supplied or third-party archives—such as cloud service providers, software vendors, and enterprises handling large volumes of compressed data—are at risk of unauthorized file modifications or remote code execution. This could lead to data breaches, system downtime, or lateral movement within networks. The risk is amplified if the extraction process runs with elevated privileges or in critical infrastructure environments. Confidentiality may be compromised if sensitive files are overwritten or replaced, integrity is directly impacted due to unauthorized file modifications, and availability could be affected if critical system files are corrupted. European organizations in sectors like finance, healthcare, and government, which often have strict regulatory requirements for data protection, could face compliance violations and reputational damage if exploited. The medium severity rating suggests a moderate but actionable risk that should be addressed promptly to avoid potential exploitation.

Mitigation Recommendations

To mitigate CVE-2025-64346, European organizations should immediately upgrade the 'archives' Go library to version 1.0.1 or later, where the vulnerability is fixed. Additionally, organizations should implement strict validation and sanitization of archive files before extraction, including verifying archive contents do not contain path traversal sequences or unexpected file paths. Running extraction processes with the least privilege necessary reduces the impact of potential exploitation. Employing sandboxing or containerization for archive extraction workflows can further isolate potential damage. Monitoring and logging archive extraction activities can help detect suspicious behavior. Organizations should also review and update their software supply chain and CI/CD pipelines to ensure no vulnerable versions of the library are used. Finally, educating developers and system administrators about secure archive handling practices will reduce the risk of accidental exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.031Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690d86fc82f4da9bb2f8a059

Added to database: 11/7/2025, 5:43:24 AM

Last enriched: 11/14/2025, 9:17:25 AM

Last updated: 12/22/2025, 6:19:02 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats