CVE-2026-23968: CWE-61: UNIX Symbolic Link (Symlink) Following in copier-org copier
CVE-2026-23968 is a medium severity vulnerability in the Copier library and CLI tool used for rendering project templates. Versions prior to 9. 11. 2 allow safe templates to include arbitrary files or directories outside the intended template location by exploiting symbolic link (symlink) following behavior combined with the default setting `_preserve_symlinks: false`. This can lead to unintended file disclosure or manipulation during template generation. The vulnerability does not require privileges or authentication but does require user interaction to trigger template rendering. The issue is patched in version 9. 11. 2. European organizations using Copier versions before 9.
AI Analysis
Technical Summary
CVE-2026-23968 is a symbolic link (symlink) following vulnerability categorized under CWE-61 affecting the Copier project, a library and CLI application designed for rendering project templates. Copier versions before 9.11.2 assume that templates marked as safe do not contain unsafe features such as custom Jinja extensions requiring explicit trust flags. However, this vulnerability allows a safe template to include arbitrary files or directories outside the local template clone directory by leveraging symlinks in conjunction with the default setting `_preserve_symlinks: false`. When this setting is false, Copier resolves symlinks and copies the linked content, potentially exposing or overwriting files outside the intended template scope. This can lead to unauthorized file disclosure or modification during template generation, impacting confidentiality and integrity. The CVSS 4.0 base score is 6.8 (medium severity), reflecting local attack vector, low complexity, no privileges required, but user interaction needed, and high impact on confidentiality. The vulnerability is patched in Copier version 9.11.2, which changes symlink handling to prevent this behavior. No public exploits are known, but the vulnerability poses a risk especially in automated or CI/CD environments where templates are rendered without strict validation.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure or modification of sensitive files during automated project template rendering, potentially exposing confidential information or corrupting critical configuration files. Organizations using Copier in software development, DevOps pipelines, or automation tools are at risk, especially if templates are sourced from external or untrusted repositories. The impact is heightened in environments where templates are rendered with minimal oversight or where symlink preservation is not explicitly managed. This could result in data leaks, supply chain compromise, or disruption of development workflows. Confidentiality is primarily impacted, with some risk to integrity. Availability impact is minimal. The vulnerability’s exploitation requires user interaction (template rendering), so automated or unattended environments are particularly vulnerable if they process untrusted templates.
Mitigation Recommendations
European organizations should immediately upgrade Copier to version 9.11.2 or later to benefit from the patched symlink handling. Until upgrade, explicitly set `_preserve_symlinks: true` in Copier configuration to prevent symlink resolution outside the template directory. Validate and audit all templates, especially those sourced externally, to ensure they do not contain malicious symlinks. Incorporate template rendering into secure CI/CD pipelines with strict access controls and sandboxing to limit file system exposure. Monitor for unusual file access or modifications during template generation. Educate developers and DevOps teams about the risks of symlink following and safe template usage. Consider implementing file system permissions and containerization to isolate template rendering processes. Regularly review Copier usage and dependencies to detect outdated versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2026-23968: CWE-61: UNIX Symbolic Link (Symlink) Following in copier-org copier
Description
CVE-2026-23968 is a medium severity vulnerability in the Copier library and CLI tool used for rendering project templates. Versions prior to 9. 11. 2 allow safe templates to include arbitrary files or directories outside the intended template location by exploiting symbolic link (symlink) following behavior combined with the default setting `_preserve_symlinks: false`. This can lead to unintended file disclosure or manipulation during template generation. The vulnerability does not require privileges or authentication but does require user interaction to trigger template rendering. The issue is patched in version 9. 11. 2. European organizations using Copier versions before 9.
AI-Powered Analysis
Technical Analysis
CVE-2026-23968 is a symbolic link (symlink) following vulnerability categorized under CWE-61 affecting the Copier project, a library and CLI application designed for rendering project templates. Copier versions before 9.11.2 assume that templates marked as safe do not contain unsafe features such as custom Jinja extensions requiring explicit trust flags. However, this vulnerability allows a safe template to include arbitrary files or directories outside the local template clone directory by leveraging symlinks in conjunction with the default setting `_preserve_symlinks: false`. When this setting is false, Copier resolves symlinks and copies the linked content, potentially exposing or overwriting files outside the intended template scope. This can lead to unauthorized file disclosure or modification during template generation, impacting confidentiality and integrity. The CVSS 4.0 base score is 6.8 (medium severity), reflecting local attack vector, low complexity, no privileges required, but user interaction needed, and high impact on confidentiality. The vulnerability is patched in Copier version 9.11.2, which changes symlink handling to prevent this behavior. No public exploits are known, but the vulnerability poses a risk especially in automated or CI/CD environments where templates are rendered without strict validation.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure or modification of sensitive files during automated project template rendering, potentially exposing confidential information or corrupting critical configuration files. Organizations using Copier in software development, DevOps pipelines, or automation tools are at risk, especially if templates are sourced from external or untrusted repositories. The impact is heightened in environments where templates are rendered with minimal oversight or where symlink preservation is not explicitly managed. This could result in data leaks, supply chain compromise, or disruption of development workflows. Confidentiality is primarily impacted, with some risk to integrity. Availability impact is minimal. The vulnerability’s exploitation requires user interaction (template rendering), so automated or unattended environments are particularly vulnerable if they process untrusted templates.
Mitigation Recommendations
European organizations should immediately upgrade Copier to version 9.11.2 or later to benefit from the patched symlink handling. Until upgrade, explicitly set `_preserve_symlinks: true` in Copier configuration to prevent symlink resolution outside the template directory. Validate and audit all templates, especially those sourced externally, to ensure they do not contain malicious symlinks. Incorporate template rendering into secure CI/CD pipelines with strict access controls and sandboxing to limit file system exposure. Monitor for unusual file access or modifications during template generation. Educate developers and DevOps teams about the risks of symlink following and safe template usage. Consider implementing file system permissions and containerization to isolate template rendering processes. Regularly review Copier usage and dependencies to detect outdated versions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T14:49:06.314Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697154cc4623b1157cf0b381
Added to database: 1/21/2026, 10:35:56 PM
Last enriched: 1/29/2026, 8:48:29 AM
Last updated: 2/6/2026, 4:05:22 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1976: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1975: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1228: CWE-639 Authorization Bypass Through User-Controlled Key in bplugins Timeline Block – Beautiful Timeline Builder for WordPress (Vertical & Horizontal Timelines)
MediumCVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.