Impact
The vulnerability occurs when Poetry’s extractall() function processes source distribution tarballs without path traversal protection on Python versions where the tarfile.data_filter API is unavailable. A malicious tarball can cause files to be extracted outside the intended directory, potentially allowing a local user to create or overwrite files such as configuration files or executables. This is a classic path traversal flaw (CWE‑22) and the damaging effect is inferred from the ability to write arbitrary files.
Affected Systems
Poetry releases earlier than 2.3.4 that run on Python 3.10.0 through 3.10.12 or Python 3.11.0 through 3.11.4 are affected. Poetry 2.3.4 and later contain the patch. Versions of Poetry that run on other Python releases or newer Poetry releases are not impacted.
Risk and Exploitability
The CVSS score is 0.6 and the EPSS score is below 1 %, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a local user who can run Poetry and has write access to the extraction target; the attack vector is therefore local. While the probability of widespread exploitation is low and the potential impact is confined to the user’s environment, the low severity does not diminish the need to apply the fix promptly.
OpenCVE Enrichment
Github GHSA