Symlink Attack Affecting zheny-creator/YtGrabber-TUI package, versions [1.0-alpha-2,1.0-rc)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ZHENYCREATORYTGRABBERTUI-13544003
  • published14 Oct 2025
  • disclosed13 Oct 2025
  • creditUnknown

Introduced: 13 Oct 2025

NewCVE-2025-62363  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade zheny-creator/YtGrabber-TUI to version 1.0-rc or higher.

Overview

Affected versions of this package are vulnerable to Symlink Attack via the path_to_yt_dlp configuration setting. An attacker can execute arbitrary code by replacing the configured executable with a malicious file or creating a symlink to an arbitrary executable, which will be run with the privileges of the user.

##Workaround

This issue can be mitigated by:

  • ensuring the path_to_yt_dlp configuration points only to a trusted, absolute, canonical path (e.g., /usr/bin/yt-dlp or /usr/local/bin/yt-dlp);
  • filesystem permissions are restricted so that untrusted users cannot create or modify the configured executable or symlinks to it;
  • avoiding the use of shell wrappers or scripts for the configured yt-dlp executable;
  • validating the executable manually (e.g., SHA256 hash check) before each run.

References

CVSS Base Scores

version 4.0
version 3.1