CVE-2025-32779: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in labsai EDDI
E.D.D.I (Enhanced Dialog Driven Interface) is a middleware to connect and manage LLM API bots. In versions before 5.5.0, an attacker with access to the `/backup/import` API endpoint can write arbitrary files to locations outside the intended extraction directory due to a Zip Slip vulnerability. Although the application runs as a non-root user (`185`), limiting direct impact on system-level files, this vulnerability can still be exploited to overwrite application files (e.g., JAR libraries) owned by the application user. This overwrite can potentially lead to Remote Code Execution (RCE) within the application's context. This issue has been patched in version 5.5.0.
AI Analysis
Technical Summary
CVE-2025-32779 is a path traversal vulnerability classified under CWE-22 affecting labsai's EDDI middleware, which facilitates connection and management of large language model (LLM) API bots. The flaw exists in versions prior to 5.5.0 and is exploitable via the /backup/import API endpoint. Specifically, the vulnerability is a Zip Slip issue where an attacker can craft malicious archive files that, when extracted by the application, write files outside the intended extraction directory. This improper limitation of pathname traversal allows overwriting arbitrary files owned by the application user (UID 185). Although the application does not run as root, overwriting critical application files such as JAR libraries can lead to remote code execution within the application's privilege context. The attack vector requires the attacker to have authenticated access to the API endpoint but does not require user interaction. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. No public exploits are currently known, and the vendor has released a patch in version 5.5.0 to address this issue.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to significant operational disruption and potential compromise of sensitive data managed by the EDDI middleware. Although the application runs with limited privileges, successful exploitation can overwrite application binaries or libraries, enabling remote code execution within the application context. This could allow attackers to manipulate bot behaviors, inject malicious code, or disrupt service availability. Organizations relying on EDDI for managing LLM API bots may experience degraded service, data integrity loss, or unauthorized actions performed by compromised bots. The medium CVSS score reflects the need for authentication, which somewhat limits exposure, but insider threats or compromised credentials could facilitate exploitation. Given the increasing adoption of AI and LLM-based services in Europe, this vulnerability poses a tangible risk to organizations integrating such middleware into their workflows.
Mitigation Recommendations
The primary mitigation is to upgrade labsai EDDI to version 5.5.0 or later, where the vulnerability is patched. Until upgrade is possible, organizations should restrict access to the /backup/import API endpoint to trusted administrators only, enforce strong authentication and authorization controls, and monitor API usage logs for suspicious activity. Implementing network segmentation to isolate the EDDI service and applying strict input validation on uploaded archives can reduce risk. Additionally, employing runtime application self-protection (RASP) or file integrity monitoring can help detect unauthorized file modifications. Regularly auditing application user permissions and ensuring the application runs with the least privilege necessary will limit potential damage. Finally, organizations should prepare incident response plans specific to middleware compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-32779: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in labsai EDDI
Description
E.D.D.I (Enhanced Dialog Driven Interface) is a middleware to connect and manage LLM API bots. In versions before 5.5.0, an attacker with access to the `/backup/import` API endpoint can write arbitrary files to locations outside the intended extraction directory due to a Zip Slip vulnerability. Although the application runs as a non-root user (`185`), limiting direct impact on system-level files, this vulnerability can still be exploited to overwrite application files (e.g., JAR libraries) owned by the application user. This overwrite can potentially lead to Remote Code Execution (RCE) within the application's context. This issue has been patched in version 5.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-32779 is a path traversal vulnerability classified under CWE-22 affecting labsai's EDDI middleware, which facilitates connection and management of large language model (LLM) API bots. The flaw exists in versions prior to 5.5.0 and is exploitable via the /backup/import API endpoint. Specifically, the vulnerability is a Zip Slip issue where an attacker can craft malicious archive files that, when extracted by the application, write files outside the intended extraction directory. This improper limitation of pathname traversal allows overwriting arbitrary files owned by the application user (UID 185). Although the application does not run as root, overwriting critical application files such as JAR libraries can lead to remote code execution within the application's privilege context. The attack vector requires the attacker to have authenticated access to the API endpoint but does not require user interaction. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. No public exploits are currently known, and the vendor has released a patch in version 5.5.0 to address this issue.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to significant operational disruption and potential compromise of sensitive data managed by the EDDI middleware. Although the application runs with limited privileges, successful exploitation can overwrite application binaries or libraries, enabling remote code execution within the application context. This could allow attackers to manipulate bot behaviors, inject malicious code, or disrupt service availability. Organizations relying on EDDI for managing LLM API bots may experience degraded service, data integrity loss, or unauthorized actions performed by compromised bots. The medium CVSS score reflects the need for authentication, which somewhat limits exposure, but insider threats or compromised credentials could facilitate exploitation. Given the increasing adoption of AI and LLM-based services in Europe, this vulnerability poses a tangible risk to organizations integrating such middleware into their workflows.
Mitigation Recommendations
The primary mitigation is to upgrade labsai EDDI to version 5.5.0 or later, where the vulnerability is patched. Until upgrade is possible, organizations should restrict access to the /backup/import API endpoint to trusted administrators only, enforce strong authentication and authorization controls, and monitor API usage logs for suspicious activity. Implementing network segmentation to isolate the EDDI service and applying strict input validation on uploaded archives can reduce risk. Additionally, employing runtime application self-protection (RASP) or file integrity monitoring can help detect unauthorized file modifications. Regularly auditing application user permissions and ensuring the application runs with the least privilege necessary will limit potential damage. Finally, organizations should prepare incident response plans specific to middleware compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-10T12:51:12.278Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf76cb
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 10/28/2025, 4:16:35 AM
Last updated: 12/3/2025, 5:47:59 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.