CVE-2025-6237: CWE-73 External Control of File Name or Path in invoke-ai invoke-ai/invokeai
A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.
AI Analysis
Technical Summary
CVE-2025-6237 is a critical security vulnerability identified in the invoke-ai project, specifically affecting versions v6.0.0a1 and earlier. The vulnerability is classified under CWE-73, which pertains to external control of file names or paths. The flaw exists in the GET /api/v1/images/download/{bulk_download_item_name} endpoint, where insufficient validation of user-supplied input allows an attacker to perform path traversal attacks. By manipulating the 'bulk_download_item_name' parameter, an attacker can traverse directories on the server filesystem and access arbitrary files. This can lead to unauthorized reading of sensitive files such as SSH private keys, database files, and configuration files. Moreover, the vulnerability also permits arbitrary file deletion, which can disrupt service availability and compromise data integrity. The CVSS v3.0 score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely without authentication or user interaction, and impacts confidentiality, integrity, and availability at a high level. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of potential damage make this a significant threat. The lack of available patches at the time of disclosure further exacerbates the risk for users of the affected invoke-ai versions.
Potential Impact
For European organizations utilizing invoke-ai, particularly those integrating it into production environments or handling sensitive data, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of confidential information, including cryptographic keys and database contents, potentially resulting in data breaches and compliance violations under regulations such as GDPR. The ability to delete arbitrary files threatens system stability and availability, potentially causing service outages or data loss. Organizations in sectors such as research, healthcare, finance, and government that rely on AI tools like invoke-ai for image processing or generation may face operational disruptions and reputational damage. Furthermore, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable systems from anywhere, including hostile geopolitical actors or cybercriminal groups targeting European infrastructure.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the vulnerable endpoint through network-level controls such as firewalls or API gateways, limiting exposure to trusted internal networks only. Organizations should implement strict input validation and sanitization on the 'bulk_download_item_name' parameter to prevent path traversal sequences (e.g., '..', absolute paths). Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting this endpoint. Regularly audit server file permissions to ensure that the invoke-ai process runs with the least privileges necessary, preventing it from accessing or deleting critical system files. Monitoring logs for unusual access patterns or file deletion activities related to the API endpoint can provide early detection of exploitation attempts. Finally, organizations should plan for rapid patch deployment once a fix becomes available and conduct thorough testing to verify the vulnerability is resolved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-6237: CWE-73 External Control of File Name or Path in invoke-ai invoke-ai/invokeai
Description
A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.
AI-Powered Analysis
Technical Analysis
CVE-2025-6237 is a critical security vulnerability identified in the invoke-ai project, specifically affecting versions v6.0.0a1 and earlier. The vulnerability is classified under CWE-73, which pertains to external control of file names or paths. The flaw exists in the GET /api/v1/images/download/{bulk_download_item_name} endpoint, where insufficient validation of user-supplied input allows an attacker to perform path traversal attacks. By manipulating the 'bulk_download_item_name' parameter, an attacker can traverse directories on the server filesystem and access arbitrary files. This can lead to unauthorized reading of sensitive files such as SSH private keys, database files, and configuration files. Moreover, the vulnerability also permits arbitrary file deletion, which can disrupt service availability and compromise data integrity. The CVSS v3.0 score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely without authentication or user interaction, and impacts confidentiality, integrity, and availability at a high level. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of potential damage make this a significant threat. The lack of available patches at the time of disclosure further exacerbates the risk for users of the affected invoke-ai versions.
Potential Impact
For European organizations utilizing invoke-ai, particularly those integrating it into production environments or handling sensitive data, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of confidential information, including cryptographic keys and database contents, potentially resulting in data breaches and compliance violations under regulations such as GDPR. The ability to delete arbitrary files threatens system stability and availability, potentially causing service outages or data loss. Organizations in sectors such as research, healthcare, finance, and government that rely on AI tools like invoke-ai for image processing or generation may face operational disruptions and reputational damage. Furthermore, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable systems from anywhere, including hostile geopolitical actors or cybercriminal groups targeting European infrastructure.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the vulnerable endpoint through network-level controls such as firewalls or API gateways, limiting exposure to trusted internal networks only. Organizations should implement strict input validation and sanitization on the 'bulk_download_item_name' parameter to prevent path traversal sequences (e.g., '..', absolute paths). Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting this endpoint. Regularly audit server file permissions to ensure that the invoke-ai process runs with the least privileges necessary, preventing it from accessing or deleting critical system files. Monitoring logs for unusual access patterns or file deletion activities related to the API endpoint can provide early detection of exploitation attempts. Finally, organizations should plan for rapid patch deployment once a fix becomes available and conduct thorough testing to verify the vulnerability is resolved.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-06-18T13:49:09.251Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68cc0b2216bc0da717cded60
Added to database: 9/18/2025, 1:37:38 PM
Last enriched: 9/18/2025, 1:37:49 PM
Last updated: 10/31/2025, 8:58:47 PM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63563: n/a
HighCVE-2025-63561: n/a
HighCVE-2025-63562: n/a
MediumCVE-2025-10693: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in silabs.com Silicon Labs Z-Wave SDK
HighCVE-2025-60711: CWE-693: Protection Mechanism Failure in Microsoft Microsoft Edge (Chromium-based)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.