CVE-2025-4748

NameCVE-2025-4748
DescriptionImproper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1107939

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)bullseye1:23.2.6+dfsg-1+deb11u1vulnerable
bullseye (security)1:23.2.6+dfsg-1+deb11u2vulnerable
bookworm, bookworm (security)1:25.2.3+dfsg-1+deb12u1vulnerable
trixie1:27.3.4+dfsg-1vulnerable
sid1:27.3.4.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsource(unstable)1:27.3.4.1+dfsg-11107939

Notes

[bookworm] - erlang <no-dsa> (Minor issue, will be fixed via spu)
https://github.com/erlang/otp/security/advisories/GHSA-9g37-pgj9-wrhc
https://github.com/erlang/otp/pull/9941
https://github.com/erlang/otp/commit/10608879c81332af2d3c00db61ee173c93c1ea4e (OTP-26.2.5.13, OTP-27.3.4.1)

Search for package or bug name: Reporting problems