The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations. Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.
History

Fri, 10 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-130
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 09 Oct 2025 18:45:00 +0000


Wed, 08 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Tue, 07 Oct 2025 18:30:00 +0000


Tue, 07 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Description The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations. Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.
Title ZIP64 End of Central Directory (EOCD) Locator record offset not checked
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published: 2025-10-07T18:10:05.908Z

Updated: 2025-10-09T18:38:08.294Z

Reserved: 2025-07-28T21:05:06.237Z

Link: CVE-2025-8291

cve-icon Vulnrichment

Updated: 2025-10-08T18:41:10.269Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-07T18:16:00.317

Modified: 2025-10-09T19:15:44.763

Link: CVE-2025-8291

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-07T18:10:05Z

Links: CVE-2025-8291 - Bugzilla