CVE-2026-23986: Copier safe template has arbitrary filesystem write access via directory symlinks when _preserve_symlinks: true
(updated )
Copier suggests that it’s safe to generate a project from a safe template, i.e. one that doesn’t use unsafe features like custom Jinja extensions which would require passing the --UNSAFE,--trust flag. As it turns out, a safe template can currently write to arbitrary directories outside the destination path by using directory a symlink along with _preserve_symlinks: true and a generated directory structure whose rendered path is inside the symlinked directory. This way, a malicious template author can create a template that overwrites arbitrary files (according to the user’s write permissions), e.g., to cause havoc.
[!NOTE]
At the time of writing, the exploit is non-deterministic, as Copier walks the template’s file tree using
os.scandirwhich yields directory entries in arbitrary order.
Reproducible example (may or may not work depending on directory entry yield order):
mkdir other/
pushd other/
echo "sensitive" > sensitive.txt
popd
mkdir src/
pushd src/
ln -s ../other other
echo "overwritten" > "{{ pathjoin('other', 'sensitive.txt') }}.jinja"
echo "_preserve_symlinks: true" > copier.yml
tree .
References
- github.com/advisories/GHSA-4fqp-r85r-hxqh
- github.com/copier-org/copier
- github.com/copier-org/copier/commit/b3a7b3772d17cf0e7a4481978188c9f536c8d8f6
- github.com/copier-org/copier/releases/tag/v9.11.2
- github.com/copier-org/copier/security/advisories/GHSA-4fqp-r85r-hxqh
- nvd.nist.gov/vuln/detail/CVE-2026-23986
Code Behaviors & Features
Detect and mitigate CVE-2026-23986 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →