Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.5

Appium ZIP Extraction Allows Malicious File Writes

GHSA-rfx7-4xw3-gh4m CVE-2026-30973 CVE-2026-30973
Summary

A security flaw in Appium's ZIP extraction feature could allow an attacker to write malicious files outside the intended directory. This issue affects Appium versions prior to 7.0.6. To protect your system, update to the latest version of Appium.

What to do
  • Update appium support to version 7.0.6.
Affected software
VendorProductAffected versionsFix available
appium support <= 7.0.5 7.0.6
Original title
Zip Slip arbitrary file write in @appium/support ZIP extraction
Original description
Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.
ghsa CVSS3.1 6.5
Vulnerability type
CWE-22 Path Traversal
Published: 10 Mar 2026 · Updated: 14 Mar 2026 · First seen: 11 Mar 2026