Vulnerability Description
Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use unsafe features like custom Jinja extensions which would require passing the `--UNSAFE,--trust` flag. As it turns out, a safe template can currently include arbitrary files/directories outside the local template clone location by using symlinks along with `_preserve_symlinks: false` (which is Copier's default setting). Version 9.11.2 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Copier-Org | Copier | < 9.11.2 |
Related Weaknesses (CWE)
References
- https://github.com/copier-org/copier/commit/b3a7b3772d17cf0e7a4481978188c9f536c8Patch
- https://github.com/copier-org/copier/security/advisories/GHSA-xjhm-gp88-8pfxExploitThird Party Advisory
FAQ
What is CVE-2026-23968?
CVE-2026-23968 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use unsafe fe...
How severe is CVE-2026-23968?
CVE-2026-23968 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23968?
Check the references section above for vendor advisories and patch information. Affected products include: Copier-Org Copier.