CVE-2025-58755: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Project-MONAI MONAI
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available.
AI Analysis
Technical Summary
CVE-2025-58755 is a high-severity path traversal vulnerability (CWE-22) affecting Project-MONAI, an AI toolkit widely used for healthcare imaging. The vulnerability exists in versions up to and including 1.5.0, where the extractall function of the zipfile module is used without proper validation of file paths during decompression. Specifically, the function zip_file.extractall(output_dir) is called directly on potentially malicious zip files. This allows an attacker to craft a zip archive containing files with path traversal sequences (e.g., '../') that can escape the intended extraction directory and overwrite arbitrary system files. The impact is critical as it can lead to full compromise of the host system by overwriting system binaries or configuration files, affecting confidentiality, integrity, and availability. Furthermore, the MONAI project allows downloading of the zip content through a link, increasing the attack surface by enabling remote exploitation without user interaction. As of the publication date, no patches or fixed versions are available, and no known exploits have been observed in the wild yet. The CVSS v3.1 score is 8.8, reflecting the network attack vector, low attack complexity, requirement for low privileges but no user interaction, and high impact on confidentiality, integrity, and availability. This vulnerability is particularly dangerous in healthcare environments where MONAI is deployed for medical imaging AI workflows, as it could lead to manipulation or destruction of sensitive patient data and disruption of critical healthcare services.
Potential Impact
For European organizations, especially healthcare providers and research institutions using MONAI for medical imaging AI, this vulnerability poses a significant risk. Exploitation could lead to unauthorized modification or deletion of critical system files, potentially causing system outages or data corruption. Given the sensitive nature of healthcare data, breaches could result in severe privacy violations under GDPR, leading to regulatory penalties and loss of patient trust. The ability to remotely trigger the vulnerability via downloadable zip files increases the likelihood of exploitation in networked environments. Disruption of AI-based diagnostic tools could delay patient care and impact clinical outcomes. Additionally, healthcare organizations are often targeted by sophisticated threat actors, increasing the risk that this vulnerability could be weaponized in targeted attacks. The lack of a patch means organizations must rely on mitigation strategies to prevent exploitation, which may complicate operational workflows and increase security overhead.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately audit and restrict access to MONAI instances, limiting exposure to untrusted users and networks. 2) Disable or restrict the functionality that allows downloading and automatic extraction of zip files from untrusted sources. 3) Implement strict input validation and sandboxing around any file extraction processes, ensuring that zip files are decompressed only in isolated environments with no write access to critical system directories. 4) Employ file integrity monitoring to detect unauthorized changes to system files that could indicate exploitation attempts. 5) Use network-level controls such as web application firewalls (WAFs) or intrusion prevention systems (IPS) to block or alert on suspicious zip file uploads or downloads. 6) Monitor logs for unusual file extraction activities or errors related to zip processing. 7) Engage with the MONAI community or vendor to track the release of patches and plan for timely updates once available. 8) Consider alternative AI imaging toolkits without this vulnerability until a fix is released, if operationally feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-58755: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Project-MONAI MONAI
Description
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-58755 is a high-severity path traversal vulnerability (CWE-22) affecting Project-MONAI, an AI toolkit widely used for healthcare imaging. The vulnerability exists in versions up to and including 1.5.0, where the extractall function of the zipfile module is used without proper validation of file paths during decompression. Specifically, the function zip_file.extractall(output_dir) is called directly on potentially malicious zip files. This allows an attacker to craft a zip archive containing files with path traversal sequences (e.g., '../') that can escape the intended extraction directory and overwrite arbitrary system files. The impact is critical as it can lead to full compromise of the host system by overwriting system binaries or configuration files, affecting confidentiality, integrity, and availability. Furthermore, the MONAI project allows downloading of the zip content through a link, increasing the attack surface by enabling remote exploitation without user interaction. As of the publication date, no patches or fixed versions are available, and no known exploits have been observed in the wild yet. The CVSS v3.1 score is 8.8, reflecting the network attack vector, low attack complexity, requirement for low privileges but no user interaction, and high impact on confidentiality, integrity, and availability. This vulnerability is particularly dangerous in healthcare environments where MONAI is deployed for medical imaging AI workflows, as it could lead to manipulation or destruction of sensitive patient data and disruption of critical healthcare services.
Potential Impact
For European organizations, especially healthcare providers and research institutions using MONAI for medical imaging AI, this vulnerability poses a significant risk. Exploitation could lead to unauthorized modification or deletion of critical system files, potentially causing system outages or data corruption. Given the sensitive nature of healthcare data, breaches could result in severe privacy violations under GDPR, leading to regulatory penalties and loss of patient trust. The ability to remotely trigger the vulnerability via downloadable zip files increases the likelihood of exploitation in networked environments. Disruption of AI-based diagnostic tools could delay patient care and impact clinical outcomes. Additionally, healthcare organizations are often targeted by sophisticated threat actors, increasing the risk that this vulnerability could be weaponized in targeted attacks. The lack of a patch means organizations must rely on mitigation strategies to prevent exploitation, which may complicate operational workflows and increase security overhead.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately audit and restrict access to MONAI instances, limiting exposure to untrusted users and networks. 2) Disable or restrict the functionality that allows downloading and automatic extraction of zip files from untrusted sources. 3) Implement strict input validation and sandboxing around any file extraction processes, ensuring that zip files are decompressed only in isolated environments with no write access to critical system directories. 4) Employ file integrity monitoring to detect unauthorized changes to system files that could indicate exploitation attempts. 5) Use network-level controls such as web application firewalls (WAFs) or intrusion prevention systems (IPS) to block or alert on suspicious zip file uploads or downloads. 6) Monitor logs for unusual file extraction activities or errors related to zip processing. 7) Engage with the MONAI community or vendor to track the release of patches and plan for timely updates once available. 8) Consider alternative AI imaging toolkits without this vulnerability until a fix is released, if operationally feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-04T19:18:09.499Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bf6ad1d5a2966cfc843648
Added to database: 9/8/2025, 11:46:25 PM
Last enriched: 9/9/2025, 12:01:22 AM
Last updated: 9/9/2025, 9:12:27 PM
Views: 5
Related Threats
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.