CVE-2025-58438
Python vulnerability analysis and mitigation

Overview

CVE-2025-58438 is a critical directory traversal vulnerability discovered in the internetarchive Python library's File.download() method, affecting versions 5.5.0 and below. The vulnerability was disclosed on September 6, 2025, and impacts the file download functionality of the library. The vulnerability affects all operating systems but is particularly critical for Windows users (NVD, GitHub Advisory).

Technical details

The vulnerability exists in the File.download() method which failed to properly sanitize user-supplied filenames or validate the final download path. The issue is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The vulnerability received a CVSS v4.0 score of 9.4 CRITICAL with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H, indicating its severe nature (NVD).

Impact

A maliciously crafted filename containing path traversal sequences (e.g., ../../../../windows/system32/file.txt) or illegal characters could cause files to be written outside of the intended target directory. This could potentially lead to overwriting critical system files or application configuration files, resulting in denial of service, privilege escalation, or remote code execution, depending on the context in which the library is used (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 5.5.1 of the internetarchive library. The fix includes automatic filename sanitization with platform-specific rules, path resolution checks to block directory traversal attacks, and warnings when filenames are sanitized. Users are strongly urged to upgrade to version 5.5.1 or later, as there are no safe workarounds without upgrading (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66471HIGH8.9
  • PythonPython
  • py3-urllib3
NoYesDec 05, 2025
CVE-2025-66418HIGH8.9
  • PythonPython
  • python-urllib3
NoYesDec 05, 2025
CVE-2025-65958HIGH8.5
  • PythonPython
  • cpe:2.3:a:openwebui:open_webui
NoYesDec 04, 2025
CVE-2025-56427HIGH7.5
  • PythonPython
  • composio
NoNoDec 04, 2025
CVE-2025-63681MEDIUM4.3
  • PythonPython
  • open-webui
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management