<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2026-009850</VulinfoID>
    <VulinfoData>
      <Title>Codehaus Plexus&#12398;Plexus-Utils&#12395;&#12362;&#12369;&#12427;&#12497;&#12473;&#12488;&#12521;&#12496;&#12540;&#12469;&#12523;&#12398;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>plexus-utils &#12398; org.codehaus.plexus.util.Expand &#12398; extractFile &#12513;&#12477;&#12483;&#12489;&#12395;&#12487;&#12451;&#12524;&#12463;&#12488;&#12522;&#12488;&#12521;&#12496;&#12540;&#12469;&#12523;&#12398;&#33030;&#24369;&#24615;&#12364;&#23384;&#22312;&#12375;&#12414;&#12377;&#65288;&#12496;&#12540;&#12472;&#12519;&#12531; 6d780b3378829318ba5c2d29547e0012d5b29642 &#12424;&#12426;&#21069;&#12398;&#12496;&#12540;&#12472;&#12519;&#12531;&#12395;&#35442;&#24403;&#65289;&#12290;&#12371;&#12428;&#12395;&#12424;&#12426;&#12289;&#25915;&#25731;&#32773;&#12364;&#20219;&#24847;&#12398;&#12467;&#12540;&#12489;&#12434;&#23455;&#34892;&#12391;&#12365;&#12427;&#21487;&#33021;&#24615;&#12364;&#12354;&#12426;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:codehaus-plexus:plexus-utils</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-009850.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2025-67030</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2025-67030</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>GitHub</Name>
          <VulinfoID>CVE-2025-67030.txt  GitHub</VulinfoID>
          <URL>https://gist.github.com/weaver4VD/3216dac645220f8c9b488362f61241ec</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2025-67030</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2025-67030</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-22</VulinfoID>
          <Title>&#12497;&#12473;&#12539;&#12488;&#12521;&#12496;&#12540;&#12469;&#12523;</Title>
          <URL>https://jvndb.jvn.jp/ja/cwe/CWE-22.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>Fix directory traversal vulnerability in Expand.extractFile by Copilot  Pull Request #295  codehaus-plexus/plexus-utils  GitHub</VulinfoID>
          <URL>https://github.com/codehaus-plexus/plexus-utils/pull/295</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>Fix Zip Slip vulnerability in archive extraction by Copilot  Pull Request #296  codehaus-plexus/plexus-utils  GitHub</VulinfoID>
          <URL>https://github.com/codehaus-plexus/plexus-utils/pull/296</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>Fix Zip Slip vulnerability in archive extraction (#296)  codehaus-plexus/plexus-utils@6d780b3  GitHub</VulinfoID>
          <URL>https://github.com/codehaus-plexus/plexus-utils/commit/6d780b3378829318ba5c2d29547e0012d5b29642</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>directory traversal still in org.codehaus.plexus.util.Expand  Issue #294  codehaus-plexus/plexus-utils</VulinfoID>
          <URL>https://github.com/codehaus-plexus/plexus-utils/issues/294</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-04-03T11:18:25+09:00</DateFirstPublished>
      <DateLastUpdated>2026-04-03T11:18:25+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
