CVE-2025-59343

ADVISORY - github

Summary

Impact

v3.1.0, v2.1.3, v1.16.5 and below

Patches

Has been patched in 3.1.1, 2.1.4, and 1.16.6

Workarounds

You can use the ignore option to ignore non files/directories.

  ignore (_, header) {
    // pass files & directories, ignore e.g. symlinks
    return header.type !== 'file' && header.type !== 'directory'
  }

Credit

Reported by: Mapta / BugBunny_ai

EPSS Score: 0.00066 (0.207)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

UNIX Symbolic Link (Symlink) Following

ADVISORY - github

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

UNIX Symbolic Link (Symlink) Following


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in