Description
Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _external_data feature allows a template to load YAML files using template-controlled paths. If untrusted templates are in scope, a malicious template can read attacker-chosen YAML-parseable local files that are accessible to the user running Copier and expose their contents in rendered output. This issue has been patched in version 9.14.1.
Published: 2026-04-02
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local file read – sensitive data disclosure via path traversal
Action: Patch Now
AI Analysis

Impact

Copier, a library and CLI application for rendering project templates, contains a flaw in its _external_data feature that permits templates to specify paths for loading YAML files. Prior to version 9.14.1, this functionality fails to normalize or restrict the supplied path, enabling a malicious template to read any YAML‑parseable file that the executing user can access. The content of these files is exposed in the rendered output, potentially revealing confidential configuration or credential information. This vulnerability is classified as a path traversal leading to local file read (CWE‑22).

Affected Systems

The affected component is the Copier package, distributed under the copier‑org organization. The issue exists in all releases before version 9.14.1 of the library and its command‑line interface. Users who employ untrusted template sources or incorporate external templates into their project generation process are at risk. The official fix is included in release v9.14.1, which removes the ability for templates to load arbitrary local files without explicit unsafe mode.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity. No EPSS score is available and the vulnerability is not listed in CISA's KEV database. Exploitation requires a user to execute Copier with a template that has been crafted by an attacker or compromised repository. Since the read operation occurs under the privileges of the person running Copier, the impact is limited to files accessible to that user, but the exposure of configuration data can aid further attacks. The lack of a public exploit and the moderate score suggest a realistic but not imminent threat, yet patching remains the safest mitigation.

Generated by OpenCVE AI on April 2, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Copier version 9.14.1 or later
  • If upgrade is not possible, avoid using untrusted templates or disable the _external_data feature
  • Verify the provenance and integrity of templates before use
  • Limit the privileges of the user running Copier to reduce the attack surface

Generated by OpenCVE AI on April 2, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hgjq-p8cr-gg4h Copier `_external_data` allows path traversal and absolute-path local file read without unsafe mode
History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:copier-org:copier:*:*:*:*:*:python:*:*

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Copier-org
Copier-org copier
Vendors & Products Copier-org
Copier-org copier

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _external_data feature allows a template to load YAML files using template-controlled paths. If untrusted templates are in scope, a malicious template can read attacker-chosen YAML-parseable local files that are accessible to the user running Copier and expose their contents in rendered output. This issue has been patched in version 9.14.1.
Title Copier `_external_data` allows path traversal and absolute-path local file read without unsafe mode
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Copier-org Copier
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T13:01:14.081Z

Reserved: 2026-03-30T18:41:20.754Z

Link: CVE-2026-34730

cve-icon Vulnrichment

Updated: 2026-04-03T13:01:04.817Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T19:21:32.560

Modified: 2026-04-03T19:43:42.730

Link: CVE-2026-34730

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:17:01Z

Weaknesses