CVE-2026-30973
Description
Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@appium/supportnpm | < 7.0.6 | 7.0.6 |
Affected products
2- @appium/supportv5Range: < 7.0.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/appium/appium/security/advisories/GHSA-rfx7-4xw3-gh4mnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-rfx7-4xw3-gh4mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-30973ghsaADVISORY
- github.com/appium/appium/releases/tag/@appium/support@7.0.6nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.