CVE-2025-0851: CWE-36: Absolute Path Traversal in AWS DeepJavaLibrary
A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.
AI Analysis
Technical Summary
CVE-2025-0851 is an absolute path traversal vulnerability categorized under CWE-36 and CWE-73, found in the AWS Deep Java Library (DJL) version 0.1.0. The vulnerability resides in the ZipUtils.unzip and TarUtils.untar methods, which improperly handle archive extraction paths. This flaw enables an attacker to craft malicious ZIP or TAR archives containing file paths that traverse directories (e.g., using '../') and write files outside the intended extraction directory. Because the vulnerability requires no authentication or user interaction and is remotely exploitable over the network, it poses a severe risk. Successful exploitation can lead to arbitrary file writes, potentially overwriting critical system or application files, enabling remote code execution, privilege escalation, or persistent malware installation. The vulnerability affects all platforms where DJL 0.1.0 is deployed, impacting any environment using this library for AI or machine learning tasks. Despite no known exploits in the wild, the critical CVSS score (9.3) reflects the ease of exploitation and the high impact on confidentiality, integrity, and availability. AWS has not yet released a patch, so users must apply interim mitigations to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2025-0851 can be significant, especially those leveraging AWS Deep Java Library in AI, machine learning, or data processing pipelines. Arbitrary file writes can lead to system compromise, data breaches, or disruption of critical services. Confidentiality may be breached if sensitive files are overwritten or replaced with malicious payloads. Integrity is at high risk due to potential tampering with application binaries or configuration files. Availability could be affected if critical system files are corrupted or deleted. Organizations in sectors such as finance, healthcare, and critical infrastructure, which increasingly adopt AI technologies, could face operational disruptions and regulatory consequences under GDPR if personal data is exposed or systems are compromised. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in automated or cloud environments common in Europe.
Mitigation Recommendations
Until an official patch is released by AWS, European organizations should implement the following mitigations: 1) Avoid using DJL version 0.1.0 for processing untrusted archives; 2) Implement strict input validation and sanitization to detect and block archive files containing path traversal sequences before extraction; 3) Run archive extraction processes with least privilege, restricting file system write permissions to dedicated sandbox directories; 4) Employ runtime monitoring and alerting for unexpected file writes outside designated extraction paths; 5) Use containerization or virtual machines to isolate the extraction process, limiting potential damage; 6) Keep AWS SDKs and related dependencies up to date and subscribe to AWS security advisories for patch announcements; 7) Conduct security audits of AI/ML pipelines to identify use of vulnerable DJL versions and replace or upgrade accordingly.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland, Italy
CVE-2025-0851: CWE-36: Absolute Path Traversal in AWS DeepJavaLibrary
Description
A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.
AI-Powered Analysis
Technical Analysis
CVE-2025-0851 is an absolute path traversal vulnerability categorized under CWE-36 and CWE-73, found in the AWS Deep Java Library (DJL) version 0.1.0. The vulnerability resides in the ZipUtils.unzip and TarUtils.untar methods, which improperly handle archive extraction paths. This flaw enables an attacker to craft malicious ZIP or TAR archives containing file paths that traverse directories (e.g., using '../') and write files outside the intended extraction directory. Because the vulnerability requires no authentication or user interaction and is remotely exploitable over the network, it poses a severe risk. Successful exploitation can lead to arbitrary file writes, potentially overwriting critical system or application files, enabling remote code execution, privilege escalation, or persistent malware installation. The vulnerability affects all platforms where DJL 0.1.0 is deployed, impacting any environment using this library for AI or machine learning tasks. Despite no known exploits in the wild, the critical CVSS score (9.3) reflects the ease of exploitation and the high impact on confidentiality, integrity, and availability. AWS has not yet released a patch, so users must apply interim mitigations to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2025-0851 can be significant, especially those leveraging AWS Deep Java Library in AI, machine learning, or data processing pipelines. Arbitrary file writes can lead to system compromise, data breaches, or disruption of critical services. Confidentiality may be breached if sensitive files are overwritten or replaced with malicious payloads. Integrity is at high risk due to potential tampering with application binaries or configuration files. Availability could be affected if critical system files are corrupted or deleted. Organizations in sectors such as finance, healthcare, and critical infrastructure, which increasingly adopt AI technologies, could face operational disruptions and regulatory consequences under GDPR if personal data is exposed or systems are compromised. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in automated or cloud environments common in Europe.
Mitigation Recommendations
Until an official patch is released by AWS, European organizations should implement the following mitigations: 1) Avoid using DJL version 0.1.0 for processing untrusted archives; 2) Implement strict input validation and sanitization to detect and block archive files containing path traversal sequences before extraction; 3) Run archive extraction processes with least privilege, restricting file system write permissions to dedicated sandbox directories; 4) Employ runtime monitoring and alerting for unexpected file writes outside designated extraction paths; 5) Use containerization or virtual machines to isolate the extraction process, limiting potential damage; 6) Keep AWS SDKs and related dependencies up to date and subscribe to AWS security advisories for patch announcements; 7) Conduct security audits of AI/ML pipelines to identify use of vulnerable DJL versions and replace or upgrade accordingly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-01-29T17:39:51.866Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ee9ba2d8f994a66eca6017
Added to database: 10/14/2025, 6:51:14 PM
Last enriched: 10/14/2025, 6:55:06 PM
Last updated: 10/16/2025, 3:27:41 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10700: CWE-352 Cross-Site Request Forgery (CSRF) in elemntor Ally – Web Accessibility & Usability
MediumCVE-2025-11683: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in TODDR YAML::Syck
UnknownCVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.