Skip to main content

CVE-2025-44779: n/a

Medium
VulnerabilityCVE-2025-44779cvecve-2025-44779
Published: Thu Aug 07 2025 (08/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Ollama v0.1.33 allows attackers to delete arbitrary files via sending a crafted packet to the endpoint /api/pull.

AI-Powered Analysis

AILast updated: 08/07/2025, 15:47:41 UTC

Technical Analysis

CVE-2025-44779 is a security vulnerability identified in Ollama version 0.1.33, where an attacker can delete arbitrary files on the affected system by sending a specially crafted packet to the /api/pull endpoint. This vulnerability indicates a lack of proper input validation or authorization controls on the API endpoint, allowing unauthorized users to manipulate file deletion operations. The vulnerability does not specify affected versions beyond 0.1.33, and no patch information is currently available. The absence of a CVSS score suggests that the vulnerability is newly disclosed and has not yet been fully assessed or exploited in the wild. The attack vector involves network access to the API endpoint, which may be exposed on internal or external networks depending on deployment. Exploitation could lead to deletion of critical files, potentially causing denial of service, data loss, or disruption of application functionality. The vulnerability does not mention authentication requirements, implying that it might be exploitable without credentials, increasing its risk profile. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once the vulnerability becomes widely known.

Potential Impact

For European organizations using Ollama v0.1.33, this vulnerability poses a significant risk to system integrity and availability. Arbitrary file deletion can disrupt business operations, cause data loss, and require costly recovery efforts. Organizations relying on Ollama for critical workloads or data processing could experience service outages or corruption of essential files. The impact is heightened if the API endpoint is exposed to untrusted networks or if internal network segmentation is weak. Additionally, regulatory requirements such as GDPR emphasize data integrity and availability, so exploitation could lead to compliance issues and reputational damage. The lack of authentication requirements increases the threat surface, making it easier for attackers to exploit the vulnerability remotely. European organizations with limited patch management or vulnerability response capabilities may be particularly vulnerable to this threat.

Mitigation Recommendations

1. Immediately restrict access to the /api/pull endpoint by implementing network-level controls such as firewalls or VPNs to limit exposure to trusted users only. 2. Apply strict input validation and sanitization on all API requests to prevent malicious payloads from triggering file deletion. 3. Implement authentication and authorization mechanisms on the API endpoints to ensure only authorized users can perform sensitive operations. 4. Monitor logs for unusual activity targeting the /api/pull endpoint, including unexpected file deletion attempts. 5. Develop and deploy patches or updates from the vendor as soon as they become available. 6. Conduct a thorough audit of file system permissions to minimize the potential damage from unauthorized deletions. 7. Maintain regular backups of critical data and configuration files to enable rapid recovery in case of exploitation. 8. Educate system administrators and security teams about this vulnerability and encourage proactive vulnerability scanning and penetration testing focused on API security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6894c71cad5a09ad00fac0ca

Added to database: 8/7/2025, 3:32:44 PM

Last enriched: 8/7/2025, 3:47:41 PM

Last updated: 8/8/2025, 12:34:03 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats