pf4j before 20c2f80 has a path traversal vulnerability in the extract() function of Unzip.java, where improper handling of zip entry names can allow directory traversal or Zip Slip attacks, due to a lack of proper path normalization and validation.
References
| Link | Resource |
|---|---|
| https://gist.github.com/weaver4VD/410f23adb24ef5f5077f021f4393e705 | Third Party Advisory |
| https://github.com/pf4j/pf4j/commit/20c2f80089d1ea779e22c2de5f109a0bce4e1b14 | Patch |
| https://github.com/pf4j/pf4j/issues/618 | Issue Tracking Third Party Advisory |
| https://github.com/pf4j/pf4j/issues/623 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
01 Apr 2026, 13:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/weaver4VD/410f23adb24ef5f5077f021f4393e705 - Third Party Advisory | |
| References | () https://github.com/pf4j/pf4j/commit/20c2f80089d1ea779e22c2de5f109a0bce4e1b14 - Patch | |
| References | () https://github.com/pf4j/pf4j/issues/618 - Issue Tracking, Third Party Advisory | |
| References | () https://github.com/pf4j/pf4j/issues/623 - Exploit, Issue Tracking, Third Party Advisory | |
| First Time |
Pf4j Project
Pf4j Project pf4j |
|
| CPE | cpe:2.3:a:pf4j_project:pf4j:*:*:*:*:*:*:*:* |
28 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-22 | |
| Summary |
|
25 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-25 19:16
Updated : 2026-04-01 13:44
NVD link : CVE-2025-70952
Mitre link : CVE-2025-70952
CVE.ORG link : CVE-2025-70952
JSON object : View
Products Affected
pf4j_project
- pf4j
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
