CVE-2025-6237: CWE-73 External Control of File Name or Path in invoke-ai invoke-ai/invokeai
A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.
AI Analysis
Technical Summary
CVE-2025-6237 is a critical security vulnerability identified in the invoke-ai project, specifically affecting versions v6.0.0a1 and earlier. The vulnerability is classified under CWE-73, which pertains to external control of file names or paths. The flaw exists in the GET /api/v1/images/download/{bulk_download_item_name} endpoint, where insufficient validation of user-supplied input allows an attacker to perform path traversal attacks. By manipulating the 'bulk_download_item_name' parameter, an attacker can traverse directories on the server filesystem and access arbitrary files. This can lead to unauthorized reading of sensitive files such as SSH private keys, database files, and configuration files. Moreover, the vulnerability also permits arbitrary file deletion, which can disrupt service availability and compromise data integrity. The CVSS v3.0 score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely without authentication or user interaction, and impacts confidentiality, integrity, and availability at a high level. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of potential damage make this a significant threat. The lack of available patches at the time of disclosure further exacerbates the risk for users of the affected invoke-ai versions.
Potential Impact
For European organizations utilizing invoke-ai, particularly those integrating it into production environments or handling sensitive data, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of confidential information, including cryptographic keys and database contents, potentially resulting in data breaches and compliance violations under regulations such as GDPR. The ability to delete arbitrary files threatens system stability and availability, potentially causing service outages or data loss. Organizations in sectors such as research, healthcare, finance, and government that rely on AI tools like invoke-ai for image processing or generation may face operational disruptions and reputational damage. Furthermore, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable systems from anywhere, including hostile geopolitical actors or cybercriminal groups targeting European infrastructure.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the vulnerable endpoint through network-level controls such as firewalls or API gateways, limiting exposure to trusted internal networks only. Organizations should implement strict input validation and sanitization on the 'bulk_download_item_name' parameter to prevent path traversal sequences (e.g., '..', absolute paths). Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting this endpoint. Regularly audit server file permissions to ensure that the invoke-ai process runs with the least privileges necessary, preventing it from accessing or deleting critical system files. Monitoring logs for unusual access patterns or file deletion activities related to the API endpoint can provide early detection of exploitation attempts. Finally, organizations should plan for rapid patch deployment once a fix becomes available and conduct thorough testing to verify the vulnerability is resolved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-6237: CWE-73 External Control of File Name or Path in invoke-ai invoke-ai/invokeai
Description
A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.
AI-Powered Analysis
Technical Analysis
CVE-2025-6237 is a critical security vulnerability identified in the invoke-ai project, specifically affecting versions v6.0.0a1 and earlier. The vulnerability is classified under CWE-73, which pertains to external control of file names or paths. The flaw exists in the GET /api/v1/images/download/{bulk_download_item_name} endpoint, where insufficient validation of user-supplied input allows an attacker to perform path traversal attacks. By manipulating the 'bulk_download_item_name' parameter, an attacker can traverse directories on the server filesystem and access arbitrary files. This can lead to unauthorized reading of sensitive files such as SSH private keys, database files, and configuration files. Moreover, the vulnerability also permits arbitrary file deletion, which can disrupt service availability and compromise data integrity. The CVSS v3.0 score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely without authentication or user interaction, and impacts confidentiality, integrity, and availability at a high level. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of potential damage make this a significant threat. The lack of available patches at the time of disclosure further exacerbates the risk for users of the affected invoke-ai versions.
Potential Impact
For European organizations utilizing invoke-ai, particularly those integrating it into production environments or handling sensitive data, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of confidential information, including cryptographic keys and database contents, potentially resulting in data breaches and compliance violations under regulations such as GDPR. The ability to delete arbitrary files threatens system stability and availability, potentially causing service outages or data loss. Organizations in sectors such as research, healthcare, finance, and government that rely on AI tools like invoke-ai for image processing or generation may face operational disruptions and reputational damage. Furthermore, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable systems from anywhere, including hostile geopolitical actors or cybercriminal groups targeting European infrastructure.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the vulnerable endpoint through network-level controls such as firewalls or API gateways, limiting exposure to trusted internal networks only. Organizations should implement strict input validation and sanitization on the 'bulk_download_item_name' parameter to prevent path traversal sequences (e.g., '..', absolute paths). Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting this endpoint. Regularly audit server file permissions to ensure that the invoke-ai process runs with the least privileges necessary, preventing it from accessing or deleting critical system files. Monitoring logs for unusual access patterns or file deletion activities related to the API endpoint can provide early detection of exploitation attempts. Finally, organizations should plan for rapid patch deployment once a fix becomes available and conduct thorough testing to verify the vulnerability is resolved.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-06-18T13:49:09.251Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68cc0b2216bc0da717cded60
Added to database: 9/18/2025, 1:37:38 PM
Last enriched: 9/18/2025, 1:37:49 PM
Last updated: 9/18/2025, 4:00:37 PM
Views: 4
Related Threats
CVE-2025-10688: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10650: CWE-269 Improper Privilege Management in SoftIron HyperCloud
HighCVE-2025-26503: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Wind River Systems Inc VxWorks 7
MediumCVE-2025-10687: SQL Injection in SourceCodester Responsive E-Learning System
MediumCVE-2025-10676: Improper Authorization in fuyang_lipengjun platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.