Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23968: CWE-61: UNIX Symbolic Link (Symlink) Following in copier-org copier

0
Medium
VulnerabilityCVE-2026-23968cvecve-2026-23968cwe-61
Published: Wed Jan 21 2026 (01/21/2026, 22:13:25 UTC)
Source: CVE Database V5
Vendor/Project: copier-org
Product: copier

Description

CVE-2026-23968 is a medium severity vulnerability in the Copier project templating tool prior to version 9. 11. 2. It involves unsafe symbolic link (symlink) following behavior when generating projects from templates. By default, Copier sets `_preserve_symlinks` to false, allowing a safe template to include arbitrary files or directories outside the intended template directory via symlinks. This can lead to unintended file disclosure or manipulation during template rendering. The vulnerability does not require privileges or authentication but does require user interaction to trigger. The issue is patched in version 9. 11. 2.

AI-Powered Analysis

AILast updated: 01/21/2026, 22:50:32 UTC

Technical Analysis

CVE-2026-23968 is a vulnerability classified under CWE-61 (Improper Restriction of Symbolic Links) affecting the Copier library and CLI tool used for rendering project templates. Copier versions prior to 9.11.2 have a default configuration where `_preserve_symlinks` is set to false. This setting causes Copier to follow symbolic links within templates, which can be exploited by an attacker to include arbitrary files or directories outside the local template clone location. The vulnerability arises because Copier assumes that templates without unsafe features (like custom Jinja extensions) are safe, but symlinks can bypass this assumption. An attacker can craft a template that includes symlinks pointing to sensitive files or directories on the host system. When a user generates a project from such a template, Copier will follow these symlinks and include the linked content, potentially exposing sensitive data or overwriting files. Exploitation requires user interaction to run Copier with the malicious template but does not require elevated privileges or authentication. The vulnerability has a CVSS 4.0 score of 6.8, reflecting a medium severity impact primarily on confidentiality due to unauthorized file inclusion. The issue is resolved in Copier version 9.11.2 by changing the handling of symlinks to prevent following them by default or by other protective measures.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure or modification of files during automated project templating processes. Organizations relying on Copier for software development, DevOps automation, or infrastructure as code could inadvertently expose sensitive configuration files, credentials, or proprietary code if malicious or compromised templates are used. This could lead to data breaches, intellectual property loss, or disruption of development workflows. The impact is particularly significant for sectors with strict data protection requirements such as finance, healthcare, and government. Additionally, organizations using shared or third-party templates from untrusted sources are at higher risk. The vulnerability does not directly enable remote code execution but can facilitate further attacks if sensitive files are exposed. Given the medium severity and ease of exploitation through user interaction, the threat is non-trivial but manageable with proper controls.

Mitigation Recommendations

European organizations should immediately upgrade Copier to version 9.11.2 or later to apply the patch that addresses this vulnerability. Until upgraded, users should avoid generating projects from untrusted or unknown templates, especially those that could contain symlinks. It is recommended to audit existing templates for symlink usage and enforce policies to restrict template sources to trusted repositories. Additionally, organizations can configure Copier to preserve symlinks (`_preserve_symlinks: true`) if this aligns with their security posture, preventing automatic following of symlinks. Implementing file system monitoring and access controls to detect or block unauthorized file access during template generation can further reduce risk. Educating developers and DevOps teams about the risks of using unverified templates and enforcing code review processes for templates can help prevent exploitation. Finally, integrating template scanning tools that detect unsafe symlink usage before deployment is advisable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.314Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697154cc4623b1157cf0b381

Added to database: 1/21/2026, 10:35:56 PM

Last enriched: 1/21/2026, 10:50:32 PM

Last updated: 1/21/2026, 11:38:00 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats