Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rfx7-4xw3-gh4m | @appium/support has a Zip Slip arbitrary file write in its ZIP extraction |
Thu, 07 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Appium appium\/support
|
|
| CPEs | cpe:2.3:a:appium:appium\/support:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Appium appium\/support
|
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Appium
Appium support |
|
| Vendors & Products |
Appium
Appium support |
Tue, 10 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6. | |
| Title | Zip Slip arbitrary file write in @appium/support ZIP extraction | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T14:25:09.401Z
Reserved: 2026-03-07T17:53:48.816Z
Link: CVE-2026-30973
Updated: 2026-03-12T14:24:52.901Z
Status : Analyzed
Published: 2026-03-10T18:18:56.063
Modified: 2026-05-07T20:46:26.913
Link: CVE-2026-30973
No data.
OpenCVE Enrichment
Updated: 2026-04-16T04:00:09Z
Github GHSA