Platform
go
Component
github.com/mholt/archiver
Fixed in
3.5.2
3.5.2
CVE-2025-3445 is a Path Traversal vulnerability affecting the github.com/mholt/archiver Go library. This vulnerability allows attackers to potentially read arbitrary files on the system by crafting malicious ZIP archives. Versions of the library prior to 3.0.1 are vulnerable, and upgrading to the patched version is the recommended remediation.
An attacker exploiting this vulnerability can leverage a specially crafted ZIP file to navigate outside the intended directory structure and access sensitive files on the server. This could include configuration files, source code, or even system files, depending on the permissions of the process running the mholt/archiver library. The potential for data exfiltration and system compromise is significant. While direct remote code execution is unlikely, the ability to read arbitrary files could be a stepping stone for further attacks, such as privilege escalation or information disclosure.
CVE-2025-3445 was publicly disclosed on 2025-08-05. There is currently no indication of active exploitation or a KEV listing. Public proof-of-concept code is likely to emerge given the ease of exploiting path traversal vulnerabilities. Monitor security advisories and vulnerability tracking resources for updates.
Exploit Status
EPSS
0.67% (71% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-3445 is to upgrade the github.com/mholt/archiver library to version 3.0.1 or later. If upgrading is not immediately feasible, consider implementing input validation and sanitization on ZIP file contents before processing them with the library. Specifically, rigorously validate the file paths extracted from the ZIP archive to ensure they remain within the expected directory. WAF rules can be implemented to block uploads of ZIP files with suspicious path traversal patterns (e.g., ../). After upgrading, confirm the fix by attempting to extract a malicious ZIP file containing path traversal sequences and verifying that access is denied.
Actualice a una versión de la librería mholt/archiver que no sea vulnerable. Considere migrar a mholt/archives, el sucesor de mholt/archiver, que ha eliminado la funcionalidad Unarchive(). Si no es posible actualizar, evite usar la función archiver.Unarchive() con archivos ZIP provenientes de fuentes no confiables.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-3445 is a Path Traversal vulnerability in the github.com/mholt/archiver Go library, allowing attackers to read arbitrary files via crafted ZIP files.
You are affected if you are using a version of github.com/mholt/archiver prior to 3.0.1 and process ZIP files.
Upgrade the github.com/mholt/archiver library to version 3.0.1 or later. Implement input validation on ZIP file contents as a temporary workaround.
There is currently no confirmed active exploitation, but public proof-of-concept code is expected.
Refer to the GitHub repository for updates and advisories: https://github.com/mholt/archiver
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your go.mod file and we'll tell you instantly if you're affected.