Vulnerability Description
Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Appium | Appium\/Support | < 7.0.6 |
Related Weaknesses (CWE)
References
- https://github.com/appium/appium/releases/tag/@appium/[email protected]Release Notes
- https://github.com/appium/appium/security/advisories/GHSA-rfx7-4xw3-gh4mExploitVendor Advisory
- https://github.com/appium/appium/security/advisories/GHSA-rfx7-4xw3-gh4mExploitVendor Advisory
FAQ
What is CVE-2026-30973?
CVE-2026-30973 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAl...
How severe is CVE-2026-30973?
CVE-2026-30973 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-30973?
Check the references section above for vendor advisories and patch information. Affected products include: Appium Appium\/Support.