CVE-2026-3087
Published: Mon, 27 Apr 2026 21:16
Summary
If `shutil.unpack_archive()` is given a ZIP archive with an absolute Windows path containing a drive (`C:\\...`) then the archive will be extracted outside the target directory which is different than
Details
If `shutil.unpack_archive()` is given a ZIP archive with an absolute Windows path containing a drive (`C:\\...`) then the archive will be extracted outside the target directory which is different than other operating systems. Only Windows is affected by this vulnerability.
Are YOU affected by CVE-2026-3087?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-3087 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://github.com/python/cpython/commit/ab5ef98af693bded74a738570e81ea70abef2840
- https://github.com/python/cpython/commit/b01e594fbe754a960212f908d047294e880b52fd
- https://github.com/python/cpython/commit/fc829e88753858c8ac669594bf0093f44948c0f4
- https://github.com/python/cpython/issues/146581
- https://github.com/python/cpython/pull/146591
- https://mail.python.org/archives/list/security-announce@python.org/thread/X6FXE5C6KDKOVNX3EC3DWD5RUPFWOZA4/
- http://www.openwall.com/lists/oss-security/2026/04/28/9
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.