RCE Vulnerability (CVE-2025-62518) Discovered in Popular Rust Library async-tar and Its Forks
23 October 2025 at 07:35
![]()
Technical Overview of the CVE‑2025‑62518 Vulnerability
The issue lies in the inconsistent handling of PAX and ustar headers during TAR-file extraction in the affected Rust library. In some TAR archives, a PAX header may indicate a file size (say X bytes), while the accompanying ustar header incorrectly indicates zero bytes. The vulnerable library uses the ustar size (zero) when advancing the stream, failing to skip over the actual file data of the nested archive. As a result, the parser misaligns and treats headers of the nested archive as entries in the outer archive. This misalignment allows for:- File-overwriting attacks during extraction
- Supply-chain poisoning via build systems or package managers
- Bypassing security scanners or manifest checks by hiding nested archives
Scope & affected ecosystem
Because tokio-tar has over 5 million downloads and has been used widely (often as an indirect dependency), the blast radius is large. Projects known to be impacted include uv (a Python package manager), testcontainers, and wasmCloud. The complexity is worsened by the fact that the most popular fork (tokio‐tar) appears to be unmaintained (“abandonware”), meaning the fix cannot simply be pushed upstream and inherited automatically.Disclosure timeline
The vulnerability disclosure followed a non-standard, decentralized process because of the upstream abandonment. Key dates:- August 21, 2025: Bug discovered by Edera and a minimal repro built.
- August 22: Patches created and initial disclosures made to library maintainers and select downstream users under a 60-day embargo (ending October 21).
- September 2: Acknowledgment from the upstream async-tar project.
- October 21, 2025: Public release of advisory and patches.