Vulnerability Description
pf4j before 20c2f80 has a path traversal vulnerability in the extract() function of Unzip.java, where improper handling of zip entry names can allow directory traversal or Zip Slip attacks, due to a lack of proper path normalization and validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pf4J Project | Pf4J | < 3.14.1 |
Related Weaknesses (CWE)
References
- https://gist.github.com/weaver4VD/410f23adb24ef5f5077f021f4393e705Third Party Advisory
- https://github.com/pf4j/pf4j/commit/20c2f80089d1ea779e22c2de5f109a0bce4e1b14Patch
- https://github.com/pf4j/pf4j/issues/618Issue TrackingThird Party Advisory
- https://github.com/pf4j/pf4j/issues/623ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-70952?
CVE-2025-70952 is a vulnerability with a CVSS score of 7.5 (HIGH). pf4j before 20c2f80 has a path traversal vulnerability in the extract() function of Unzip.java, where improper handling of zip entry names can allow directory traversal or Zip Slip attacks, due to a l...
How severe is CVE-2025-70952?
CVE-2025-70952 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-70952?
Check the references section above for vendor advisories and patch information. Affected products include: Pf4J Project Pf4J.