Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5980: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in lightning-ai lightning-ai/pytorch-lightning

0
Critical
VulnerabilityCVE-2024-5980cvecve-2024-5980cwe-22
Published: Thu Jun 27 2024 (06/27/2024, 18:46:39 UTC)
Source: CVE Database V5
Vendor/Project: lightning-ai
Product: lightning-ai/pytorch-lightning

Description

A vulnerability in the /v1/runs API endpoint of lightning-ai/pytorch-lightning v2.2.4 allows attackers to exploit path traversal when extracting tar.gz files. When the LightningApp is running with the plugin_server, attackers can deploy malicious tar.gz plugins that embed arbitrary files with path traversal vulnerabilities. This can result in arbitrary files being written to any directory in the victim's local file system, potentially leading to remote code execution.

AI-Powered Analysis

AILast updated: 10/22/2025, 13:40:05 UTC

Technical Analysis

CVE-2024-5980 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), affecting the lightning-ai/pytorch-lightning framework version 2.2.4. The flaw exists in the /v1/runs API endpoint when the LightningApp operates with the plugin_server enabled. Attackers can craft malicious tar.gz plugin archives containing files with path traversal sequences (e.g., '../') that bypass directory restrictions during extraction. This improper sanitization allows arbitrary files to be written to any location on the host file system, outside the intended plugin directory. Such unauthorized file writes can lead to remote code execution if attackers overwrite executable files or place malicious scripts in sensitive locations. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.0 score of 9.1 reflects its criticality, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. While no public exploits are known yet, the potential for severe impact on confidentiality, integrity, and availability is high. The vulnerability poses a significant risk to organizations deploying lightning-ai/pytorch-lightning in AI model training or deployment pipelines, especially when accepting plugins from untrusted sources. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through operational controls and monitoring.

Potential Impact

For European organizations, this vulnerability can lead to severe consequences including unauthorized modification or destruction of critical files, insertion of backdoors, and full system compromise. AI research institutions, cloud service providers, and enterprises using lightning-ai/pytorch-lightning for machine learning workflows may face disruption of services, data breaches, and intellectual property theft. The ability to execute arbitrary code remotely without authentication increases the risk of widespread exploitation, potentially affecting supply chains and AI model integrity. Given the increasing reliance on AI frameworks in Europe’s digital economy and research sectors, exploitation could undermine trust in AI deployments and cause regulatory compliance issues under GDPR if personal data is compromised. Additionally, organizations in critical infrastructure sectors leveraging AI could face operational outages or sabotage. The absence of known exploits currently provides a window for proactive defense, but the high severity demands urgent attention.

Mitigation Recommendations

1. Immediately monitor official lightning-ai channels for patches or updates addressing CVE-2024-5980 and apply them as soon as they become available. 2. Until patched, disable the plugin_server feature or restrict its usage to trusted internal environments only. 3. Implement strict validation and sanitization of all plugin archives before deployment, including scanning for path traversal sequences and verifying archive contents against expected directory structures. 4. Employ network segmentation and firewall rules to limit access to the /v1/runs API endpoint to authorized users and systems only. 5. Use runtime application self-protection (RASP) or host-based intrusion detection systems (HIDS) to detect anomalous file writes or execution attempts. 6. Enforce least privilege principles on the file system permissions for the LightningApp process to minimize the impact of arbitrary file writes. 7. Conduct regular security audits and penetration tests focusing on plugin deployment mechanisms. 8. Educate development and DevOps teams about the risks of accepting untrusted plugins and the importance of secure plugin management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-06-13T17:47:39.581Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2a178f764e1f470d05

Added to database: 10/15/2025, 1:01:30 PM

Last enriched: 10/22/2025, 1:40:05 PM

Last updated: 11/28/2025, 3:19:25 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats