CVSS Score: 8.1 Published: 2025-12-30 Full Report: https://cvereports.com/reports/GHSA-xphh-5v4r-r3rx
A critical Path Traversal vulnerability in PsiTransfer allows attackers to weaponize the 'Download Archive' feature. By uploading files with malicious filenames, attackers can generate archives that perform arbitrary file overwrites on the victim's machine upon extraction.
PsiTransfer trusted user-supplied filenames a little too much. Attackers can upload files named like ../../.ssh/authorized_keys. When a victim downloads these files as a ZIP or TAR, the server dutifully packs that malicious path. If the victim extracts this archive, the attacker's file escapes the download folder and overwrites critical system files, potentially leading to RCE on the client machine.
- Bug Class: Path Traversal / Zip Slip
- Attack Vector: Network (Uploaded Metadata)
- CVSS: 8.1 (High)
- Impact: Client-Side Arbitrary File Write
- Component: Archive Generator (lib/endpoints.js)
- Exploit Status: Functional PoC Available
- PsiTransfer < 2.3.1
- PsiTransfer: < 2.3.1 (Fixed in:
2.3.1)
- Input Sanitization
- Output Encoding
- Archive Hardening
Remediation Steps:
- Upgrade PsiTransfer to version 2.3.1 or later immediately.
- If upgrade is impossible, modify
lib/endpoints.jsto reject filenames containing '..' or '/'. - Review stored metadata in
data.jsonfor existing malicious filenames.
Generated by CVEReports - Automated Vulnerability Intelligence