Skip to main content

CVE-2023-37476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenRefine OpenRefine

Medium
VulnerabilityCVE-2023-37476cvecve-2023-37476cwe-22
Published: Mon Jul 17 2023 (07/17/2023, 21:02:46 UTC)
Source: CVE Database V5
Vendor/Project: OpenRefine
Product: OpenRefine

Description

OpenRefine is a free, open source tool for data processing. A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution in the context of the OpenRefine process if a user can be convinced to import it. The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. Users unable to upgrade should only import OpenRefine projects from trusted sources.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:48:22 UTC

Technical Analysis

CVE-2023-37476 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects OpenRefine, a widely used open-source data processing tool, in all versions up to and including 3.7.3. The core issue arises when a user imports a maliciously crafted OpenRefine project tar file. Due to insufficient validation of file paths within the project archive, an attacker can exploit this flaw to execute arbitrary code within the context of the OpenRefine process. This means that if a user is tricked into importing a specially designed project file from an untrusted source, the attacker can potentially run commands or manipulate the system with the same privileges as the OpenRefine application. The vulnerability requires user interaction (importing the malicious project) and privileges to run OpenRefine, but does not require elevated system privileges beyond that. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with attack vector being network-based, low attack complexity, requiring privileges and user interaction, and impacting confidentiality, integrity, and availability to a limited extent. The vulnerability was publicly disclosed on July 17, 2023, and fixed in OpenRefine version 3.7.4. No known exploits are currently reported in the wild, but the risk remains significant due to the potential for arbitrary code execution.

Potential Impact

For European organizations, the impact of this vulnerability can be considerable, especially for those relying on OpenRefine for data cleaning, transformation, and analysis tasks. Successful exploitation could lead to unauthorized code execution, potentially allowing attackers to access sensitive data, alter data integrity, or disrupt data processing workflows. This could affect data-driven decision-making, regulatory compliance (such as GDPR), and operational continuity. Since OpenRefine is often used in research institutions, government agencies, and enterprises handling large datasets, exploitation could lead to data breaches or sabotage of critical data pipelines. The requirement for user interaction (importing a malicious project) limits the attack surface but also highlights the importance of user awareness and secure handling of project files. The medium severity suggests that while the vulnerability is not trivially exploitable remotely without user action, the consequences of exploitation justify prompt remediation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading OpenRefine installations to version 3.7.4 or later, where the issue is resolved. For environments where immediate upgrade is not feasible, strict policies should be enforced to only import OpenRefine project files from fully trusted and verified sources. Implementing file integrity checks and digital signatures for project files can help verify authenticity before import. Additionally, organizations should conduct user training to raise awareness about the risks of importing untrusted files and encourage cautious handling of project data. Network segmentation and least privilege principles should be applied to limit the impact of any potential compromise. Monitoring OpenRefine process behavior and system logs for unusual activity following project imports can aid in early detection of exploitation attempts. Finally, consider sandboxing or running OpenRefine in isolated environments to minimize the risk of system-wide impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-07-06T13:01:36.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389fa5

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 7/11/2025, 8:48:22 PM

Last updated: 8/5/2025, 4:50:36 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats