The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-8869

CVE-2025-8869: pip Path Traversal Vulnerability

CVE-2025-8869 is a path traversal vulnerability in pip's fallback tar extraction code that affects Python versions without PEP 706. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 1, 2026

CVE-2025-8869 Overview

CVE-2025-8869 is a symlink vulnerability in pip's tar archive extraction functionality that affects Python environments not implementing PEP 706. When extracting tar archives, pip may fail to properly validate that symbolic links point within the intended extraction directory, potentially allowing an attacker to write files outside the expected location through a maliciously crafted source distribution (sdist).

This vulnerability specifically impacts pip's fallback implementation of tar extraction, which is used on Python versions that do not implement PEP 706. Users running Python versions >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12 with native PEP 706 support are not affected, as pip utilizes the secure tarfile implementation in these versions.

Critical Impact

Attackers can craft malicious source distributions (sdists) containing symbolic links that escape the extraction directory, potentially overwriting arbitrary files on the target system during package installation.

Affected Products

  • pip (all versions prior to the fix) running on Python versions without PEP 706 implementation
  • Python versions <3.9.17, <3.10.12, <3.11.4, or <3.12
  • Systems installing untrusted Python packages from source distributions

Discovery Timeline

  • 2025-09-24 - CVE-2025-8869 published to NVD
  • 2025-11-03 - Last updated in NVD database

Technical Details for CVE-2025-8869

Vulnerability Analysis

The vulnerability exists in pip's fallback tar extraction mechanism designed for Python interpreters that lack PEP 706 support. PEP 706 introduced security enhancements to Python's tarfile module to prevent directory traversal and symlink attacks during archive extraction.

When pip operates on a Python installation without PEP 706, it implements its own extraction logic to handle tar archives containing source distributions. However, this fallback implementation contains an insufficient check for symbolic links, failing to verify that symlink targets resolve to paths within the intended extraction directory.

An attacker can exploit this by crafting a malicious sdist containing a symbolic link that points to a location outside the extraction directory (e.g., ../../../etc/). When pip extracts this archive, subsequent files following the symlink in the archive can be written to arbitrary locations on the filesystem, subject to the permissions of the user running pip.

Root Cause

The root cause is improper validation of symbolic link targets during tar archive extraction in pip's fallback code path. The vulnerable code fails to canonicalize and verify that symlink destinations remain within the extraction directory boundary before creating the links, enabling path traversal via symlink following.

Attack Vector

This vulnerability is exploitable over the network when a user installs a malicious Python package from an untrusted source. The attack requires user interaction—specifically, the victim must execute a pip install command targeting a package containing the malicious tar archive.

The attack flow involves:

  1. Attacker creates a malicious source distribution (sdist) containing a crafted symbolic link pointing outside the extraction directory
  2. Attacker hosts or distributes this package through an accessible repository
  3. Victim installs the malicious package using pip on a vulnerable Python version
  4. During extraction, the symlink is created pointing to an attacker-controlled destination
  5. Subsequent archive entries following the symlink are written to arbitrary filesystem locations

The vulnerability affects the integrity of the target system by allowing unauthorized file writes, though it does not directly impact confidentiality or availability.

Detection Methods for CVE-2025-8869

Indicators of Compromise

  • Unexpected symbolic links created in Python package installation directories (site-packages)
  • Modified system files that coincide with recent pip package installations
  • Presence of suspicious source distributions containing symbolic links in pip's cache directory
  • Unusual file modifications in system directories following pip install operations

Detection Strategies

  • Audit pip installation logs for source distribution extractions on vulnerable Python versions
  • Implement file integrity monitoring on critical system directories to detect unauthorized modifications
  • Scan package caches and virtual environments for tar archives containing suspicious symbolic links
  • Monitor for pip install commands from untrusted or non-PyPI sources

Monitoring Recommendations

  • Deploy endpoint detection for anomalous file system writes during Python package installation processes
  • Implement package verification workflows that inspect sdists before installation in CI/CD pipelines
  • Configure security tools to alert on symbolic link creation in unexpected locations during pip operations
  • Establish baseline Python version inventories to identify systems running vulnerable interpreter versions

How to Mitigate CVE-2025-8869

Immediate Actions Required

  • Upgrade Python to a version implementing PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12)
  • Update pip to a version containing the fix as referenced in GitHub Pull Request #13550
  • Inspect all source distributions before installation, particularly from untrusted sources
  • Prefer installation of pre-built wheels over source distributions where possible

Patch Information

The fix is available via GitHub Pull Request #13550. Users should upgrade pip to the patched version. The Python Security Announcement provides additional context. Debian users can reference the Debian LTS Security Notice for distribution-specific guidance.

Note that upgrading pip alone does not remediate all tarfile-related vulnerabilities—the recommended approach is upgrading to a Python version with native PEP 706 support.

Workarounds

  • Upgrade Python to a version implementing PEP 706 to bypass the vulnerable fallback code entirely
  • Manually inspect source distributions for suspicious symbolic links before installation
  • Use --only-binary :all: flag with pip to prevent source distribution installation
  • Apply the patch from the linked pull request manually if pip upgrade is not immediately feasible
  • Restrict package installation to trusted sources such as PyPI with package signature verification
bash
# Check Python version for PEP 706 support
python --version

# Upgrade pip to the latest patched version
pip install --upgrade pip

# Install packages using only pre-built wheels to avoid sdist extraction
pip install --only-binary :all: package_name

# Verify pip version after upgrade
pip --version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechPip

  • SeverityMEDIUM

  • CVSS Score5.9

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityNone
  • Technical References
  • GitHub Pull Request #13550

  • Python Security Announcement

  • Debian LTS Security Notice
  • Related CVEs
  • CVE-2023-5752: Pypa Pip RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English