Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4fqp-r85r-hxqh | Copier safe template has arbitrary filesystem write access via directory symlinks when _preserve_symlinks: true |
Mon, 02 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:copier-org:copier:*:*:*:*:*:python:*:* | |
| Metrics |
cvssV3_1
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Copier-org
Copier-org copier |
|
| Vendors & Products |
Copier-org
Copier-org copier |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use unsafe features like custom Jinja extensions which would require passing the `--UNSAFE,--trust` flag. As it turns out, a safe template can currently write to arbitrary directories outside the destination path by using directory a symlink along with `_preserve_symlinks: true` and a generated directory structure whose rendered path is inside the symlinked directory. This way, a malicious template author can create a template that overwrites arbitrary files (according to the user's write permissions), e.g., to cause havoc. Version 9.11.2 patches the issue. | |
| Title | Copier safe template has arbitrary filesystem write access via directory symlinks when _preserve_symlinks: true | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-22T16:49:26.426Z
Reserved: 2026-01-19T18:49:20.656Z
Link: CVE-2026-23986
Updated: 2026-01-22T15:10:52.135Z
Status : Analyzed
Published: 2026-01-21T23:15:52.793
Modified: 2026-02-02T14:10:51.063
Link: CVE-2026-23986
No data.
OpenCVE Enrichment
Updated: 2026-04-18T04:15:05Z
Github GHSA