CVE-2025-64346
📋 TL;DR
CVE-2025-64346 is a path traversal vulnerability in the archives Go library that allows attackers to achieve remote code execution or file modification by providing specially crafted archive files. This affects any application using archives library version 1.0.0 to extract untrusted archive files. The impact severity depends on the permissions of the process using the library.
💻 Affected Systems
- archives Go library
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with remote code execution as the user running the vulnerable application, potentially leading to data theft, ransomware deployment, or complete system takeover.
Likely Case
File system manipulation including arbitrary file read/write, directory traversal, and potential privilege escalation depending on application context.
If Mitigated
Limited impact if only trusted archives are processed or if the application runs with minimal permissions in a sandboxed environment.
🎯 Exploit Status
Exploitation requires the attacker to provide a malicious archive file to a vulnerable application. No authentication is needed if the application accepts arbitrary archives.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.1
Vendor Advisory: https://github.com/jaredallard/archives/security/advisories/GHSA-j95m-rcjp-q69h
Restart Required: No
Instructions:
1. Update go.mod to require archives v1.0.1 or later. 2. Run 'go get github.com/jaredallard/archives@v1.0.1'. 3. Rebuild and redeploy your application.
🔧 Temporary Workarounds
Input validation and sanitization
allValidate archive files before processing, reject archives with suspicious paths or symlinks
Sandbox execution
allRun archive extraction in a container or sandbox with restricted filesystem access
🧯 If You Can't Patch
- Implement strict input validation to only accept archives from trusted sources
- Run the application with minimal privileges and in a chroot/jail environment
🔍 How to Verify
Check if Vulnerable:
Check go.mod or go.sum for archives dependency version 1.0.0
Check Version:
grep 'github.com/jaredallard/archives' go.mod
Verify Fix Applied:
Verify archives version is 1.0.1 or later in go.mod and that the application rebuilds successfully
📡 Detection & Monitoring
Log Indicators:
- Unexpected file operations during archive extraction
- Errors from archive library about invalid paths
Network Indicators:
- Large or unusual archive uploads to applications
SIEM Query:
Process execution from archive extraction directory OR File modification in unexpected locations following archive upload