CVE-2026-41140

NameCVE-2026-41140
DescriptionPoetry is a dependency manager for Python. Prior to 2.3.4, the extractall() function in src/poetry/utils/helpers.py:410-426 extracts sdist tarballs without path traversal protection on Python versions where tarfile.data_filter is unavailable. Considering only Python versions which are still supported by Poetry, these are 3.10.0 - 3.10.12 and 3.11.0 - 3.11.4. This vulnerability is fixed in 2.3.4.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poetry (PTS)bookworm1.3.2+dfsg-3vulnerable
trixie2.1.2+dfsg-1fixed
forky, sid2.3.2+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
poetrysource(unstable)2.1.2+dfsg-1

Notes

[bookworm] - poetry <no-dsa> (Minor issue)
https://github.com/python-poetry/poetry/security/advisories/GHSA-73h3-mf4w-8647
Fixed by: https://github.com/python-poetry/poetry/commit/47e97340cae50d3698aac858732788861ba8dd1f (main)
Fixed by: https://github.com/python-poetry/poetry/commit/e512e7fc5557251c7c9c59d0029506e77db1ea18 (2.3.4)
Only an issue with old Python, marking the version in trixie as the first fixed version since it ships Python 3.13

Search for package or bug name: Reporting problems