CVE-2025-59825

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59825
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59825.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59825
Aliases
Downstream
Published
2025-09-23T20:15:33Z
Modified
2025-09-25T05:03:58.758573Z
Summary
[none]
Details

astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.3 and earlier of astral-tokio-tar, tar archives may extract outside of their intended destination directory when using the Entry::unpackinraw API. Additionally, the Entry::allowexternalsymlinks control (which defaults to true) could be bypassed via a pair of symlinks that individually point within the destination but combine to point outside of it. These behaviors could be used individually or combined to bypass the intended security control of limiting extraction to the given directory. This in turn would allow an attacker with a malicious tar archive to perform an arbitrary file write and potentially pivot into code execution. This issue has been patched in version 0.5.4. There is no workaround other than upgrading.

References

Affected packages

Git / github.com/astral-sh/tokio-tar

Affected ranges

Type
GIT
Repo
https://github.com/astral-sh/tokio-tar
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

9b5e692
b1e6022
ba2b140
c06006a
efeaea9

v0.*

v0.5.0
v0.5.1
v0.5.2
v0.5.3

v5.*

v5.0.0