Home

Description

ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.

PUBLISHED Reserved 2025-07-31 | Published 2025-10-05 | Updated 2025-10-06 | Assigner @huntr_ai




MEDIUM: 6.3CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Any version before 0.84.2
affected

References

huntr.com/bounties/a0880d64-9928-45bf-9663-2cd81582d9e7

github.com/...ommit/5d22a48d7bf6c7f10b748577c2be79cc7969d398

cve.org (CVE-2025-8406)

nvd.nist.gov (CVE-2025-8406)

Download JSON