Erlang/OTP 17.0 < 26.2.5.13 / 27.0 < 27.3.4.1 / 28.0 < 28.0.1 Path Traversal (CVE-2025-4748)

medium Nessus Plugin ID 240158

Synopsis

The remote host is missing a security update.

Description

The version of Erlang/OTP installed on the remote host is 17.0 prior to 26.2.5.13, 27.0 prior to 27.3.4.1, or 28.0 prior to 28.0.1. It is, therefore, affected by an path traversal vulnerability:

- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4. (CVE-2025-4748)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Erlang/OTP version 26.2.5.13, 27.3.4.1, or 28.0.1 or later.

See Also

https://github.com/erlang/otp/security/advisories/GHSA-9g37-pgj9-wrhc

Plugin Details

Severity: Medium

ID: 240158

File Name: erlang_otp_28_0_1.nasl

Version: 1.1

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 6/18/2025

Updated: 6/18/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v4

Risk Factor: Medium

Base Score: 4.8

Threat Score: 1.1

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L

Vulnerability Information

CPE: cpe:/a:erlang:erlang%2fotp

Required KB Items: installed_sw/Erlang-OTP

Patch Publication Date: 6/16/2025

Vulnerability Publication Date: 6/16/2025

Reference Information

CVE: CVE-2025-4748