CVE-2025-64485: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cvat-ai cvat
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.4.0 through 2.48.1, a malicious CVAT user with at least the User global role may create files in the root of the mounted file share, or overwrite existing files. If no file share is mounted, the user will be able to create files in the share directory of the import worker container, potentially filling up disk space. This issue is fixed in version 2.49.0.
AI Analysis
Technical Summary
CVE-2025-64485 is a path traversal vulnerability (CWE-22) affecting the CVAT (Computer Vision Annotation Tool) open source software, specifically versions from 2.4.0 up to 2.48.1. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability arises because the application improperly limits pathname access, allowing a user with at least the User global role to create or overwrite files outside the intended directory boundaries. When a file share is mounted, the attacker can write files directly to the root of this share, potentially overwriting critical files or planting malicious files. If no file share is mounted, the attacker can write files into the import worker container’s share directory, which could be exploited to fill disk space and cause denial of service due to resource exhaustion. The vulnerability does not require elevated privileges beyond the User role, nor does it require user interaction, making exploitation relatively straightforward for authenticated users. The CVSS v4.0 score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required beyond User role, and no user interaction. The vulnerability was published on November 7, 2025, and fixed in CVAT version 2.49.0. No public exploits have been reported yet, but the potential for file system manipulation and denial of service is significant in environments where CVAT is deployed with shared file systems.
Potential Impact
For European organizations using CVAT versions 2.4.0 through 2.48.1, this vulnerability poses a risk of unauthorized file creation and overwriting, which can compromise data integrity and availability. Attackers with User role access could overwrite important files or plant malicious files in shared storage, potentially disrupting annotation workflows or corrupting datasets. In cases where no file share is mounted, attackers could fill disk space within the import worker container, leading to denial of service conditions that impact availability of the annotation service. This could delay critical computer vision projects, affecting sectors such as automotive, healthcare, and manufacturing that rely on CVAT for AI training data. The vulnerability does not directly expose confidentiality but could be leveraged as part of a larger attack chain. Given the collaborative nature of CVAT deployments, insider threats or compromised user accounts increase the risk. Organizations with multi-tenant or shared environments are particularly vulnerable to cross-user impacts.
Mitigation Recommendations
European organizations should immediately upgrade CVAT to version 2.49.0 or later, where this vulnerability is fixed. Until upgrade is possible, restrict User global role assignments to trusted personnel only and monitor file share directories for unauthorized file creation or modification. Implement strict access controls on mounted file shares and container storage to prevent unauthorized writes. Employ container runtime security tools to detect abnormal file system usage or disk space consumption in the import worker container. Regularly audit user activities within CVAT to detect suspicious behavior. Consider isolating CVAT instances per project or team to limit the blast radius of a compromised user account. Additionally, integrate CVAT logs with centralized SIEM solutions to enable timely detection of exploitation attempts. Finally, educate users about the risks of privilege misuse and enforce strong authentication and session management to reduce the likelihood of account compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-64485: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cvat-ai cvat
Description
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.4.0 through 2.48.1, a malicious CVAT user with at least the User global role may create files in the root of the mounted file share, or overwrite existing files. If no file share is mounted, the user will be able to create files in the share directory of the import worker container, potentially filling up disk space. This issue is fixed in version 2.49.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64485 is a path traversal vulnerability (CWE-22) affecting the CVAT (Computer Vision Annotation Tool) open source software, specifically versions from 2.4.0 up to 2.48.1. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability arises because the application improperly limits pathname access, allowing a user with at least the User global role to create or overwrite files outside the intended directory boundaries. When a file share is mounted, the attacker can write files directly to the root of this share, potentially overwriting critical files or planting malicious files. If no file share is mounted, the attacker can write files into the import worker container’s share directory, which could be exploited to fill disk space and cause denial of service due to resource exhaustion. The vulnerability does not require elevated privileges beyond the User role, nor does it require user interaction, making exploitation relatively straightforward for authenticated users. The CVSS v4.0 score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required beyond User role, and no user interaction. The vulnerability was published on November 7, 2025, and fixed in CVAT version 2.49.0. No public exploits have been reported yet, but the potential for file system manipulation and denial of service is significant in environments where CVAT is deployed with shared file systems.
Potential Impact
For European organizations using CVAT versions 2.4.0 through 2.48.1, this vulnerability poses a risk of unauthorized file creation and overwriting, which can compromise data integrity and availability. Attackers with User role access could overwrite important files or plant malicious files in shared storage, potentially disrupting annotation workflows or corrupting datasets. In cases where no file share is mounted, attackers could fill disk space within the import worker container, leading to denial of service conditions that impact availability of the annotation service. This could delay critical computer vision projects, affecting sectors such as automotive, healthcare, and manufacturing that rely on CVAT for AI training data. The vulnerability does not directly expose confidentiality but could be leveraged as part of a larger attack chain. Given the collaborative nature of CVAT deployments, insider threats or compromised user accounts increase the risk. Organizations with multi-tenant or shared environments are particularly vulnerable to cross-user impacts.
Mitigation Recommendations
European organizations should immediately upgrade CVAT to version 2.49.0 or later, where this vulnerability is fixed. Until upgrade is possible, restrict User global role assignments to trusted personnel only and monitor file share directories for unauthorized file creation or modification. Implement strict access controls on mounted file shares and container storage to prevent unauthorized writes. Employ container runtime security tools to detect abnormal file system usage or disk space consumption in the import worker container. Regularly audit user activities within CVAT to detect suspicious behavior. Consider isolating CVAT instances per project or team to limit the blast radius of a compromised user account. Additionally, integrate CVAT logs with centralized SIEM solutions to enable timely detection of exploitation attempts. Finally, educate users about the risks of privilege misuse and enforce strong authentication and session management to reduce the likelihood of account compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-05T19:12:25.102Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690e812b0e7acb8066fb4462
Added to database: 11/7/2025, 11:30:51 PM
Last enriched: 11/15/2025, 12:22:12 AM
Last updated: 12/21/2025, 9:42:25 PM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HappyDevs TempTool
MediumCVE-2025-62901: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Tormorten WP Microdata
MediumCVE-2025-62955: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in HappyDevs TempTool
MediumCVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.