CVE-2025-4435

When using a TarFile.errorlevel = 0and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0in affected versions is that the member would still be extracted and not skipped.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
PSFCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Debian logo
Debian Releases
Debian Product
Codename
jython
bullseye
2.7.2+repack1-3
not-affected
bookworm
2.7.3+repack1-1
no-dsa
trixie
2.7.3+repack1-1
no-dsa
forky
2.7.3+repack1-1
fixed
sid
2.7.3+repack1-1
fixed
pypy3
bullseye
7.3.5+dfsg-2+deb11u2
not-affected
bookworm
no-dsa
trixie
no-dsa
bullseye (security)
7.3.5+dfsg-2+deb11u4
fixed
forky
vulnerable
sid
vulnerable
python2.7
bullseye
2.7.18-8+deb11u1
fixed
bookworm
no-dsa
trixie
no-dsa
python3.11
bookworm
3.11.2-6+deb12u6
no-dsa
trixie
no-dsa
bullseye
not-affected
bookworm (security)
3.11.2-6+deb12u3
fixed
python3.13
trixie
3.13.5-2
no-dsa
bookworm
no-dsa
bullseye
not-affected
forky
3.13.7-1
fixed
sid
3.13.7-1
fixed
python3.9
bullseye
3.9.2-1
not-affected
bookworm
no-dsa
trixie
no-dsa
bullseye (security)
3.9.2-1+deb11u3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename