VYPR
Medium severity6.5NVD Advisory· Published Mar 10, 2026· Updated May 7, 2026

CVE-2026-30973

CVE-2026-30973

Description

Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@appium/supportnpm
< 7.0.67.0.6

Affected products

2
  • cpe:2.3:a:appium:appium\/support:*:*:*:*:*:node.js:*:*
    Range: <7.0.6
  • @appium/supportv5
    Range: < 7.0.6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.