CVE-2025-3445: mholt/archiver Vulnerable to Path Traversal via Crafted ZIP File
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.344%
CWE
Published
4/14/2025
Updated
4/14/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/mholt/archiver | go | <= 3.5.1 | |
| github.com/mholt/archiver/v3 | go | <= 3.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description directly implicates archiver.Unarchive as the function processing the malicious input (crafted ZIP file) and performing the unsafe extraction. The provided commit, although only a README update, confirms the project's stance on not mitigating this specific vulnerability within its extraction functionalities. The deprecation of the project and removal of Unarchive() in its successor further supports that this function was the core of the issue. While the exact file path for archiver.go is an assumption based on common Go project structures and the function name, the function signature archiver.Unarchive is clearly identified as vulnerable.