c2pa is vulnerable to Path Traversal
65
Medium Risk
Affected versions of this package are vulnerable to Path Traversal in ZIP Archive Handling due to insufficient sanitization of file paths within older-style (deprecated) zip archives, allowing an attacker to potentially read or write arbitrary files on the host filesystem by crafting a malicious archive containing path traversal sequences (e.g., ../../etc/passwd) or absolute paths, which the unpatched code would improperly extract to locations outside the intended target directory.
You are affected if you are using a version that falls within the vulnerable range.
c2pa is vulnerable to Path Traversal in versions 0.32.0 - 0.74.0.
Upgrade the c2pa library to a patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant