Impact
Poetry processes wheel files during installation. The vulnerability allows a crafted wheel to contain path components such as '..' that escape the intended extraction directory. Because Poetry lacks containment checks, it will write files to arbitrary locations on disk with the same privileges as the Poetry process. The primary impact is the ability to modify or overwrite files in the filesystem, which can lead to data corruption, privilege elevation, or facilitate subsequent payload execution if the attacker controls critical system files. The weakness is a Path Traversal flaw (CWE‑22).
Affected Systems
Python‑Poetry’s dependency manager, Poetry, is impacted. Versions starting with 1.4.0 up to, but not including, 2.3.3 are vulnerable. The issue was patched in release 2.3.3 and later. Users of any affected Poetry installation should apply the update or otherwise block untrusted wheels.
Risk and Exploitability
The CVSS score of 7.1 indicates a moderate to high severity. The EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low probability of widespread exploitation. However, the likely attack vector is the normal package installation flow from untrusted wheel sources, which is within reach of any developer or CI environment. An attacker who can supply a malicious wheel to a Poetry installation can write arbitrary files, potentially compromising the host system if they target system‑wide or configuration files.
OpenCVE Enrichment
Github GHSA