Skip to main content

CVE-2025-6237: CWE-73 External Control of File Name or Path in invoke-ai invoke-ai/invokeai

Critical
VulnerabilityCVE-2025-6237cvecve-2025-6237cwe-73
Published: Thu Sep 18 2025 (09/18/2025, 08:34:08 UTC)
Source: CVE Database V5
Vendor/Project: invoke-ai
Product: invoke-ai/invokeai

Description

A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.

AI-Powered Analysis

AILast updated: 09/18/2025, 13:37:49 UTC

Technical Analysis

CVE-2025-6237 is a critical security vulnerability identified in the invoke-ai project, specifically affecting versions v6.0.0a1 and earlier. The vulnerability is classified under CWE-73, which pertains to external control of file names or paths. The flaw exists in the GET /api/v1/images/download/{bulk_download_item_name} endpoint, where insufficient validation of user-supplied input allows an attacker to perform path traversal attacks. By manipulating the 'bulk_download_item_name' parameter, an attacker can traverse directories on the server filesystem and access arbitrary files. This can lead to unauthorized reading of sensitive files such as SSH private keys, database files, and configuration files. Moreover, the vulnerability also permits arbitrary file deletion, which can disrupt service availability and compromise data integrity. The CVSS v3.0 score of 9.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely without authentication or user interaction, and impacts confidentiality, integrity, and availability at a high level. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of potential damage make this a significant threat. The lack of available patches at the time of disclosure further exacerbates the risk for users of the affected invoke-ai versions.

Potential Impact

For European organizations utilizing invoke-ai, particularly those integrating it into production environments or handling sensitive data, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of confidential information, including cryptographic keys and database contents, potentially resulting in data breaches and compliance violations under regulations such as GDPR. The ability to delete arbitrary files threatens system stability and availability, potentially causing service outages or data loss. Organizations in sectors such as research, healthcare, finance, and government that rely on AI tools like invoke-ai for image processing or generation may face operational disruptions and reputational damage. Furthermore, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable systems from anywhere, including hostile geopolitical actors or cybercriminal groups targeting European infrastructure.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable endpoint through network-level controls such as firewalls or API gateways, limiting exposure to trusted internal networks only. Organizations should implement strict input validation and sanitization on the 'bulk_download_item_name' parameter to prevent path traversal sequences (e.g., '..', absolute paths). Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal attempts targeting this endpoint. Regularly audit server file permissions to ensure that the invoke-ai process runs with the least privileges necessary, preventing it from accessing or deleting critical system files. Monitoring logs for unusual access patterns or file deletion activities related to the API endpoint can provide early detection of exploitation attempts. Finally, organizations should plan for rapid patch deployment once a fix becomes available and conduct thorough testing to verify the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2025-06-18T13:49:09.251Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68cc0b2216bc0da717cded60

Added to database: 9/18/2025, 1:37:38 PM

Last enriched: 9/18/2025, 1:37:49 PM

Last updated: 9/18/2025, 4:00:37 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats