Home

Description

MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available.

PUBLISHED Reserved 2025-09-04 | Published 2025-09-08 | Updated 2025-09-09 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

<= 1.5.0
affected

References

github.com/.../MONAI/security/advisories/GHSA-x6ww-pf9m-m73m

cve.org (CVE-2025-58755)

nvd.nist.gov (CVE-2025-58755)

Download JSON