ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
References
Configurations
No configuration.
History
06 Oct 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/a0880d64-9928-45bf-9663-2cd81582d9e7 - |
05 Oct 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-05 09:15
Updated : 2025-10-06 15:16
NVD link : CVE-2025-8406
Mitre link : CVE-2025-8406
CVE.ORG link : CVE-2025-8406
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')