CVE-2025-59825
Rust vulnerability analysis and mitigation

Overview

astral-tokio-tar, a tar archive reading/writing library for async Rust, contains a path traversal vulnerability in versions 0.5.3 and earlier (CVE-2025-59825). The vulnerability was discovered and disclosed on September 23, 2025. The issue affects the Entry::unpackinraw API and Entry::allowexternalsymlinks control functionality, potentially allowing extraction of files outside intended destination directories (GitHub Advisory).

Technical details

The vulnerability exists in two forms: First, tar archives may extract outside of their intended destination directory when using the Entry::unpackinraw API. Second, the Entry::allowexternalsymlinks control (which defaults to true) can be bypassed using a pair of symlinks that individually point within the destination but combine to point outside of it. The vulnerability has been assigned a High severity rating and is tracked under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) (GitHub Advisory).

Impact

An attacker with a malicious tar archive could perform arbitrary file writes and potentially achieve code execution by overwriting files that the user or system executes. For the main downstream user (uv), the impact is considered low due to overlap with equivalent user capabilities in source distributions. However, for other downstream API users of this crate, the impact is considered high (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.5.4 of astral-tokio-tar. Users are advised to upgrade to version 0.5.4 or newer, as there is no workaround other than upgrading (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-393w-9x6h-8gc7HIGH8.2
  • RustRust
  • pingora-core
NoYesSep 17, 2025
CVE-2025-59825MEDIUM6.1
  • RustRust
  • trustee-guest-components
NoYesSep 23, 2025
GHSA-mm7x-qfjj-5g2cLOW1.7
  • RustRust
  • ammonia
NoYesSep 22, 2025
RUSTSEC-2025-0071N/AN/A
  • RustRust
  • ammonia
NoYesSep 21, 2025
RUSTSEC-2025-0070N/AN/A
  • RustRust
  • pingora-core
NoYesSep 17, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management