CVE-2025-4517

CRITICAL

Python <3.14 - Path Traversal

Title source: llm

Description

Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

Exploits (16)

github WRITEUP 10 stars
by DesertDemons · pythonpoc
https://github.com/DesertDemons/CVE-2025-4138-4517-POC
nomisec WORKING POC 6 stars
by AzureADTrent · poc
https://github.com/AzureADTrent/CVE-2025-4517-POC
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-4517
nomisec WORKING POC 2 stars
by AnimePrincess420 · poc
https://github.com/AnimePrincess420/CVE-2025-4517-PoC
nomisec WORKING POC 1 stars
by Gh0s7Ops · poc
https://github.com/Gh0s7Ops/CVE-2025-4517-POC
nomisec WORKING POC 1 stars
by ben-slates · poc
https://github.com/ben-slates/CVE-2025-4517-POC
nomisec WORKING POC 1 stars
by AzureADTrent · poc
https://github.com/AzureADTrent/CVE-2025-4517-POC-HTB-WingData
nomisec WORKING POC 1 stars
by StealthByte0 · poc
https://github.com/StealthByte0/CVE-2025-4517-poc
nomisec WORKING POC
by estebanzarate · poc
https://github.com/estebanzarate/CVE-2025-4517-Python-tarfile-filter-data-Bypass-PoC
github WORKING POC
by Kl3lCrypt · pythonpoc
https://github.com/Kl3lCrypt/cve-exploits/tree/main/CVE-2025-4517
nomisec WORKING POC
by ben-slates · poc
https://github.com/ben-slates/CVE-2025-4517-POC-HTB-WINGDATA
github WORKING POC
by bgutowski · pythonpoc
https://github.com/bgutowski/CVE-2025-4517-POC-Sudoers
nomisec WORKING POC
by kerburenthusiasm · poc
https://github.com/kerburenthusiasm/CVE-2025-4517-PoC
github WORKING POC
by kyakei · pythonpoc
https://github.com/kyakei/CVE-2025-4138-poc
nomisec WORKING POC
by Rohitberiwala · poc
https://github.com/Rohitberiwala/PyPath-Escape-CVE-2025-4517-Exploit-Research
nomisec WORKING POC
by 0xDTC · poc
https://github.com/0xDTC/CVE-2025-4517-tarfile-PATH_MAX-bypass

Scores

CVSS v3 9.4
EPSS 0.0040
EPSS Percentile 60.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Details

CWE
CWE-22
Status published
Products (7)
Python Software Foundation/CPython < 3.10.18
Python Software Foundation/CPython < 3.9.23
Python Software Foundation/CPython 3.10.0 - 3.10.18
Python Software Foundation/CPython 3.11.0 - 3.11.13
Python Software Foundation/CPython 3.12.0 - 3.12.11
Python Software Foundation/CPython 3.13.0 - 3.13.4
Python Software Foundation/CPython 3.14.0a1 - 3.14.0b3
Published Jun 03, 2025
Tracked Since Feb 18, 2026