vulnerability
Ubuntu: USN-7656-1 (CVE-2025-4748): Erlang vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:L/AC:M/Au:N/C:N/I:P/A:P) | Jun 16, 2025 | Jul 22, 2025 | Jan 16, 2026 |
Severity
3
CVSS
(AV:L/AC:M/Au:N/C:N/I:P/A:P)
Published
Jun 16, 2025
Added
Jul 22, 2025
Modified
Jan 16, 2026
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.
This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
Solutions
ubuntu-upgrade-erlangubuntu-upgrade-erlang-ssh
References
- CVE-2025-4748
- https://attackerkb.com/topics/CVE-2025-4748
- CWE-22
- UBUNTU-USN-7656-1
- URL-http://www.openwall.com/lists/oss-security/2025/06/16/5
- URL-https://github.com/erlang/otp/pull/9941
- URL-https://github.com/erlang/otp/security/advisories/GHSA-9g37-pgj9-wrhc
- URL-https://ubuntu.com/security/notices/USN-7656-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-4748
- URL-https://www.erlang.org/doc/system/versions.html#order-of-versions
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.