Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-4517
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Arbitrary writes via tarfile realpath overflow
Source: NVD (National Vulnerability Database)
Vulnerability Description
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Python 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Python是Python基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。 Python 3.12及之后版本存在安全漏洞,该漏洞源于提取过滤器允许任意文件系统写入提取目录外。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Python Software FoundationCPython 0 ~ 3.10.18 -
II. Public POCs for CVE-2025-4517
#POC DescriptionSource LinkShenlong Link
1CVE‑2025‑4517 Proof‑of‑Concept Scripthttps://github.com/AnimePrincess420/CVE-2025-4517-PoCPOC Details
2CVE-2025-4517 (CVSS 9.4 – Critical) A vulnerability in Python's `tarfile` https://github.com/StealthByte0/CVE-2025-4517-pocPOC Details
3Python tarfile data filter bypass via PATH_MAX overflow in os.path.realpath() - CVE-2025-4517 / CVE-2025-4330https://github.com/0xDTC/CVE-2025-4517-tarfile-PATH_MAX-bypassPOC Details
4Privilege Escalation script for Wingdatahttps://github.com/AzureADTrent/CVE-2025-4517-POC-HTB-WingDataPOC Details
5A high-performance Python toolkit to automate the CVE-2025-4517 PATH_MAX bypass exploit. Specifically tuned for the WingData HTB challenge to achieve arbitrary file writes and root persistencehttps://github.com/Rohitberiwala/PyPath-Escape-CVE-2025-4517-Exploit-ResearchPOC Details
6PoC and explanation for CVE-2025-4517 used in a CTF I was playing.https://github.com/kerburenthusiasm/CVE-2025-4517-PoCPOC Details
7Nonehttps://github.com/ben-slates/CVE-2025-4517-POC-HTB-WINGDATAPOC Details
8Path traversal vulnerability in Python's tarfile.https://github.com/estebanzarate/CVE-2025-4517-Python-tarfile-filter-data-Bypass-PoCPOC Details
9Nonehttps://github.com/ben-slates/CVE-2025-4517-POCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-4517
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-4517

No comments yet


Leave a comment