## Wanaku CLI ZipHelper Exposed: Zip Slip Path Traversal Vulnerability Allows Arbitrary File Write
A critical path traversal vulnerability has been identified in the Wanaku CLI's ZipHelper component, exposing systems to Zip Slip attacks. The flaw allows a maliciously crafted zip file to write arbitrary files outside the intended extraction directory, potentially leading to system compromise, data overwrite, or remote code execution. This is not a theoretical risk; the vulnerability is present in the current production code and can be reliably exploited.

The vulnerability resides in the `finalEntryName` method within `ZipHelper.java`. The method's validation logic is fundamentally insufficient: it only strips the first directory component from a zip entry's name. It fails to detect or sanitize path traversal sequences like `../`. Consequently, an entry named `../../../etc/passwd` would be processed, with the resulting path allowing write operations to sensitive system locations far beyond the designated temporary or working directory. The exploit chain is straightforward: create a malicious zip, use the CLI's `unzip()` function, and observe file placement outside the target folder.

This vulnerability places any application or service relying on the Wanaku CLI's file extraction utilities at immediate risk. The lack of proper path sanitization is a basic security failure that could be leveraged to overwrite configuration files, plant backdoors, or achieve privilege escalation. The issue demands urgent patching to implement comprehensive path validation, canonicalization, and containment within the target directory before any release can be considered secure for handling untrusted archive files.
---
- **Source**: GitHub Issues
- **Sector**: The Lab
- **Tags**: security, vulnerability, path traversal, zip slip, java
- **Credibility**: unverified
- **Published**: 2026-04-06 16:27:24
- **ID**: 51708
- **URL**: https://whisperx.ai/en/intel/51708