CVE-2025-4138

Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Configurations

No configuration.

History

05 Jun 2025, 14:15

Type Values Removed Values Added
Summary (en) Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links. (en) Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

04 Jun 2025, 14:54

Type Values Removed Values Added
Summary
  • (es) Permite ignorar el filtro de extracción, lo que permite que los enlaces simbólicos apunten fuera del directorio de destino y la modificación de algunos metadatos de archivo. Esta vulnerabilidad afecta al usar el módulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el parámetro filter= con el valor "data" o "tar". Consulte la documentación sobre filtros de extracción de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener más información. Solo las versiones de Python 3.12 o posteriores se ven afectadas por estas vulnerabilidades; las versiones anteriores no incluyen la función de filtro de extracción. Tenga en cuenta que para Python 3.14 o posteriores, el valor predeterminado de filter= cambió de "sin filtrado" a "data", por lo que si utiliza este nuevo comportamiento predeterminado, su uso también se verá afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalación de distribuciones de código fuente que sean archivos tar, ya que estas permiten la ejecución de código arbitrario durante el proceso de compilación. Sin embargo, al evaluar distribuciones de origen es importante evitar instalar distribuciones de origen con enlaces sospechosos.

03 Jun 2025, 21:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/9c1110ef6652687d7c55f590f909720eddde965a -
  • () https://github.com/python/cpython/commit/dd8f187d0746da151e0025c51680979ac5b4cfb1 -

03 Jun 2025, 16:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/28463dba112af719df1e8b0391c46787ad756dd9 -
  • () https://github.com/python/cpython/commit/4633f3f497b1ff70e4a35b6fe2c907cbe2d4cb2e -

03 Jun 2025, 15:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/19de092debb3d7e832e5672cc2f7b788d35951da -
  • () https://github.com/python/cpython/commit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01 -

03 Jun 2025, 14:15

Type Values Removed Values Added
References
  • () https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f -
  • () https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a -
  • () https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a -
  • () https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/ -

03 Jun 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 13:15

Updated : 2025-06-05 14:15


NVD link : CVE-2025-4138

Mitre link : CVE-2025-4138

CVE.ORG link : CVE-2025-4138


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')