Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23968: CWE-61: UNIX Symbolic Link (Symlink) Following in copier-org copier

0
Medium
VulnerabilityCVE-2026-23968cvecve-2026-23968cwe-61
Published: Wed Jan 21 2026 (01/21/2026, 22:13:25 UTC)
Source: CVE Database V5
Vendor/Project: copier-org
Product: copier

Description

CVE-2026-23968 is a medium severity vulnerability in the Copier library and CLI tool used for rendering project templates. Versions prior to 9. 11. 2 allow safe templates to include arbitrary files or directories outside the intended template location by exploiting symbolic link (symlink) following behavior combined with the default setting `_preserve_symlinks: false`. This can lead to unintended file disclosure or manipulation during template generation. The vulnerability does not require privileges or authentication but does require user interaction to trigger template rendering. The issue is patched in version 9. 11. 2. European organizations using Copier versions before 9.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:48:29 UTC

Technical Analysis

CVE-2026-23968 is a symbolic link (symlink) following vulnerability categorized under CWE-61 affecting the Copier project, a library and CLI application designed for rendering project templates. Copier versions before 9.11.2 assume that templates marked as safe do not contain unsafe features such as custom Jinja extensions requiring explicit trust flags. However, this vulnerability allows a safe template to include arbitrary files or directories outside the local template clone directory by leveraging symlinks in conjunction with the default setting `_preserve_symlinks: false`. When this setting is false, Copier resolves symlinks and copies the linked content, potentially exposing or overwriting files outside the intended template scope. This can lead to unauthorized file disclosure or modification during template generation, impacting confidentiality and integrity. The CVSS 4.0 base score is 6.8 (medium severity), reflecting local attack vector, low complexity, no privileges required, but user interaction needed, and high impact on confidentiality. The vulnerability is patched in Copier version 9.11.2, which changes symlink handling to prevent this behavior. No public exploits are known, but the vulnerability poses a risk especially in automated or CI/CD environments where templates are rendered without strict validation.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure or modification of sensitive files during automated project template rendering, potentially exposing confidential information or corrupting critical configuration files. Organizations using Copier in software development, DevOps pipelines, or automation tools are at risk, especially if templates are sourced from external or untrusted repositories. The impact is heightened in environments where templates are rendered with minimal oversight or where symlink preservation is not explicitly managed. This could result in data leaks, supply chain compromise, or disruption of development workflows. Confidentiality is primarily impacted, with some risk to integrity. Availability impact is minimal. The vulnerability’s exploitation requires user interaction (template rendering), so automated or unattended environments are particularly vulnerable if they process untrusted templates.

Mitigation Recommendations

European organizations should immediately upgrade Copier to version 9.11.2 or later to benefit from the patched symlink handling. Until upgrade, explicitly set `_preserve_symlinks: true` in Copier configuration to prevent symlink resolution outside the template directory. Validate and audit all templates, especially those sourced externally, to ensure they do not contain malicious symlinks. Incorporate template rendering into secure CI/CD pipelines with strict access controls and sandboxing to limit file system exposure. Monitor for unusual file access or modifications during template generation. Educate developers and DevOps teams about the risks of symlink following and safe template usage. Consider implementing file system permissions and containerization to isolate template rendering processes. Regularly review Copier usage and dependencies to detect outdated versions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.314Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697154cc4623b1157cf0b381

Added to database: 1/21/2026, 10:35:56 PM

Last enriched: 1/29/2026, 8:48:29 AM

Last updated: 2/7/2026, 3:06:36 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats