Home

Description

The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices

PUBLISHED Reserved 2025-09-22 | Published 2025-09-22 | Updated 2025-09-22 | Assigner JFROG




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-61 UNIX Symbolic Link (Symlink) Following

Product status

Any version
affected

References

github.com/neuml/txtai/issues/965 patch

research.jfrog.com/...itrary-file-write-jfsa-2025-001471363/ third-party-advisory

cve.org (CVE-2025-10854)

nvd.nist.gov (CVE-2025-10854)

Download JSON