Impact
The unzip() method in ApicurioCodegenWrapper extracts ZIP entries without validating that the resolved file path remains within the intended output directory. A malicious ZIP archive containing path traversal sequences such as ../../malicious.java can result in files being written outside the target directory. This allows an attacker to overwrite critical files or introduce malicious code in trusted locations, potentially compromising the integrity of the application.
Affected Systems
This vulnerability affects the quarkus-openapi-generator extension provided by Quarkus, specifically versions prior to 2.16.0 and the 2.15.0‑lts release. The issue resides in the ApicurioCodegenWrapper component within that extension.
Risk and Exploitability
The CVSS score of 7.7 assigns high severity. EPSS information is not available, and the vulnerability has not been listed in the CISA KEV catalog. Based on the description, it is inferred that the attacker would need to supply a crafted ZIP archive to the vulnerable code; the likely attack vector therefore depends on how the unzip functionality is exposed—such as through file uploads, API endpoints, or build scripts. Explicit exploitation details are not disclosed in the advisory, so the exact conditions for a successful attack remain unspecified.
OpenCVE Enrichment
Github GHSA