CVE-2025-55201
Python vulnerability analysis and mitigation

Overview

CVE-2025-55201 affects the Copier library and CLI app (versions < 9.9.1), which is used for rendering project templates. The vulnerability was discovered and disclosed on August 18, 2025. The issue allows a safe template to read and write arbitrary files because Copier exposes pathlib.Path objects in the Jinja context with unconstrained I/O methods, effectively rendering the security model with respect to filesystem access useless (GitHub Advisory).

Technical details

The vulnerability stems from the exposure of pathlib.Path objects in the Jinja context that have unconstrained I/O methods. This implementation flaw bypasses Copier's intended security model, which should restrict filesystem access through Jinja to only reading files using {% include ... %} from the subtree of the local template clone. The vulnerability has been assigned a CVSS v4.0 base score of 8.5 (High) with the vector string: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

The vulnerability enables malicious template authors to perform unauthorized file system operations, including reading sensitive files (such as SSH keys), overwriting existing files, and even deleting files and directories. Attackers could potentially extract secrets from well-known locations, mask them with encoding to reduce detection risk, and exfiltrate the data when users push generated projects to public repositories (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 9.9.1 of Copier. Users should upgrade to this version or later to address the security issue. No workarounds are available for earlier versions (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management