pf4j before 20c2f80 has a path traversal vulnerability in the extract() function of Unzip.java, where improper handling of zip entry names can allow directory traversal or Zip Slip attacks, due to a lack of proper path normalization and validation.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal Vulnerability in PF4J Zip Extraction | |
| Weaknesses | CWE-22 |
Thu, 26 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal Vulnerability in PF4J Zip Extraction | |
| Weaknesses | CWE-22 |
Thu, 26 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Pf4j Zip Extraction Path Traversal Allowing Zip Slip | |
| Weaknesses | CWE-22 CWE-36 |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pf4j
Pf4j pf4j |
|
| Vendors & Products |
Pf4j
Pf4j pf4j |
Wed, 25 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Pf4j Zip Extraction Path Traversal Allowing Zip Slip | |
| Weaknesses | CWE-22 CWE-36 |
Wed, 25 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pf4j before 20c2f80 has a path traversal vulnerability in the extract() function of Unzip.java, where improper handling of zip entry names can allow directory traversal or Zip Slip attacks, due to a lack of proper path normalization and validation. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-25T18:34:46.661Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70952
No data.
Status : Awaiting Analysis
Published: 2026-03-25T19:16:28.260
Modified: 2026-03-26T15:13:15.790
Link: CVE-2025-70952
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:20:26Z
Weaknesses
No weakness.