Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 5, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 5, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 5, 2025

      In MCP era API discoverability is now more important than ever

      June 5, 2025

      Google’s DeepMind CEO lists 2 AGI existential risks to society keeping him up at night — but claims “today’s AI systems” don’t warrant a pause on development

      June 5, 2025

      Anthropic researchers say next-generation AI models will reduce humans to “meat robots” in a spectrum of crazy futures

      June 5, 2025

      Xbox just quietly added two of the best RPGs of all time to Game Pass

      June 5, 2025

      7 reasons The Division 2 is a game you should be playing in 2025

      June 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Mastering TypeScript: How Complex Should Your Types Be?

      June 5, 2025
      Recent

      Mastering TypeScript: How Complex Should Your Types Be?

      June 5, 2025

      IDMC – CDI Best Practices

      June 5, 2025

      PWC-IDMC Migration Gaps

      June 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Google’s DeepMind CEO lists 2 AGI existential risks to society keeping him up at night — but claims “today’s AI systems” don’t warrant a pause on development

      June 5, 2025
      Recent

      Google’s DeepMind CEO lists 2 AGI existential risks to society keeping him up at night — but claims “today’s AI systems” don’t warrant a pause on development

      June 5, 2025

      Anthropic researchers say next-generation AI models will reduce humans to “meat robots” in a spectrum of crazy futures

      June 5, 2025

      Xbox just quietly added two of the best RPGs of all time to Game Pass

      June 5, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-4138 – “Python Tarfile Symlink Extraction Vulnerability”

    CVE-2025-4138 – “Python Tarfile Symlink Extraction Vulnerability”

    June 3, 2025

    CVE ID : CVE-2025-4138

    Published : June 3, 2025, 1:15 p.m. | 2 hours, 14 minutes ago

    Description : Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.

    You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of “data” or “tar”. See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don’t include the extraction filter feature.

    Note that for Python 3.14 or later the default value of filter= changed from “no filtering” to `”data”, so if you are relying on this new default behavior then your usage is also affected.

    Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it’s important to avoid installing source distributions with suspicious links.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-4330 – Python Tarfile Symlink Extraction Vulnerability
    Next Article CVE-2025-4517 – Tarfile Filter Arbitrary File Write

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48906 – DSoftBus Authentication Bypass Vulnerability

    June 6, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48907 – Apache IPC Deserialization Vulnerability

    June 6, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    What‘s the Difference Between Similarity Search and Re-Ranking?

    Development

    (non) recensione AnduinOS

    Linux

    I got my hands on the redesigned successor to 2024’s best gaming laptop for most people — I’m confident that I’m going to love it, but there is ONE downside

    News & Updates

    Intel says PC gaming handhelds are its “number one priority” — can Arrow/Panther Lake chips challenge AMD’s dominance?

    News & Updates

    Highlights

    Dumping open source for proprietary rarely pays off: Better to stick a fork in it

    February 5, 2025

    Meet the forkers: How open-source communities are outpacing their proprietary parents. Source: Latest news 

    Appium – ‘POST /element’ cannot be proxied to UiAutomator2 server because the instrumentation process is not running

    August 11, 2024

    Code as a Catalyst: Improving LLM Capabilities Across Diverse Tasks

    August 22, 2024

    The Apple Watch Series 10 is already $30 off at Walmart, but it’ll soon drop to $349 for the first time

    November 7, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.