CVE-2026-30973
Zip Slip arbitrary file write in @appium/support ZIP extraction
Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.
| CWE | CWE-22 |
| Vendor | @appium |
| Product | support |
| Published | Mar 10, 2026 |
| Last Updated | Mar 12, 2026 |
Get instant alerts for @appium support
Be the first to know when new medium vulnerabilities affecting @appium support are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N