Home

Description

The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.

PUBLISHED Reserved 2025-11-10 | Published 2026-02-04 | Updated 2026-02-04 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73: External Control of File Name or Path

Product status

< 0.18.18
affected

References

github.com/...ctured/security/advisories/GHSA-gm8q-m8mv-jj5m

github.com/...ommit/b01d35b2373fd087d2e15162b9c021663c97155d

cve.org (CVE-2025-64712)

nvd.nist.gov (CVE-2025-64712)

Download JSON