CVE-2025-8406
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-05

Last updated on: 2025-10-30

Assigner: huntr.dev

Description
ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-05
Last Modified
2025-10-30
Generated
2026-05-07
AI Q&A
2025-10-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
zenml zenml From 0.83.1 (inc) to 0.84.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal issue in ZenML version 0.83.1's PathMaterializer component. When extracting files from a tar archive (data.tar.gz), the existing validation failed to properly detect symbolic and hard links that could point outside the intended extraction directory. This flaw allows an attacker to craft a malicious tar archive that, when extracted, can write files arbitrarily anywhere on the file system, potentially overwriting critical files and enabling arbitrary command execution. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to write files to arbitrary locations on your system during the extraction of a tar archive. This can lead to overwriting important system or application files, which may result in arbitrary command execution. Such an attack could compromise the integrity and security of your system, potentially allowing unauthorized access or control. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves path traversal during tar archive extraction in ZenML's PathMaterializer. To detect exploitation attempts, monitor for suspicious tar extraction activities, especially those involving symbolic or hard links. You can inspect tar archives before extraction using commands like 'tar -tvf data.tar.gz' to list contents and check for suspicious paths (e.g., paths containing '../' or absolute paths). Additionally, scanning logs for unusual file writes outside expected directories or unexpected modifications to critical files may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update ZenML to a version that includes the patch fixing CVE-2025-8406, which enhances validation of tar archive members to prevent path traversal via symbolic and hard links. Until then, avoid extracting untrusted tar archives with the vulnerable PathMaterializer component. If you must extract archives, manually verify the contents to ensure no unsafe paths or links exist. Implement monitoring to detect unauthorized file writes outside intended directories. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart