Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64485: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cvat-ai cvat

0
Medium
VulnerabilityCVE-2025-64485cvecve-2025-64485cwe-22
Published: Fri Nov 07 2025 (11/07/2025, 23:21:06 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.4.0 through 2.48.1, a malicious CVAT user with at least the User global role may create files in the root of the mounted file share, or overwrite existing files. If no file share is mounted, the user will be able to create files in the share directory of the import worker container, potentially filling up disk space. This issue is fixed in version 2.49.0.

AI-Powered Analysis

AILast updated: 11/15/2025, 00:22:12 UTC

Technical Analysis

CVE-2025-64485 is a path traversal vulnerability (CWE-22) affecting the CVAT (Computer Vision Annotation Tool) open source software, specifically versions from 2.4.0 up to 2.48.1. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability arises because the application improperly limits pathname access, allowing a user with at least the User global role to create or overwrite files outside the intended directory boundaries. When a file share is mounted, the attacker can write files directly to the root of this share, potentially overwriting critical files or planting malicious files. If no file share is mounted, the attacker can write files into the import worker container’s share directory, which could be exploited to fill disk space and cause denial of service due to resource exhaustion. The vulnerability does not require elevated privileges beyond the User role, nor does it require user interaction, making exploitation relatively straightforward for authenticated users. The CVSS v4.0 score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required beyond User role, and no user interaction. The vulnerability was published on November 7, 2025, and fixed in CVAT version 2.49.0. No public exploits have been reported yet, but the potential for file system manipulation and denial of service is significant in environments where CVAT is deployed with shared file systems.

Potential Impact

For European organizations using CVAT versions 2.4.0 through 2.48.1, this vulnerability poses a risk of unauthorized file creation and overwriting, which can compromise data integrity and availability. Attackers with User role access could overwrite important files or plant malicious files in shared storage, potentially disrupting annotation workflows or corrupting datasets. In cases where no file share is mounted, attackers could fill disk space within the import worker container, leading to denial of service conditions that impact availability of the annotation service. This could delay critical computer vision projects, affecting sectors such as automotive, healthcare, and manufacturing that rely on CVAT for AI training data. The vulnerability does not directly expose confidentiality but could be leveraged as part of a larger attack chain. Given the collaborative nature of CVAT deployments, insider threats or compromised user accounts increase the risk. Organizations with multi-tenant or shared environments are particularly vulnerable to cross-user impacts.

Mitigation Recommendations

European organizations should immediately upgrade CVAT to version 2.49.0 or later, where this vulnerability is fixed. Until upgrade is possible, restrict User global role assignments to trusted personnel only and monitor file share directories for unauthorized file creation or modification. Implement strict access controls on mounted file shares and container storage to prevent unauthorized writes. Employ container runtime security tools to detect abnormal file system usage or disk space consumption in the import worker container. Regularly audit user activities within CVAT to detect suspicious behavior. Consider isolating CVAT instances per project or team to limit the blast radius of a compromised user account. Additionally, integrate CVAT logs with centralized SIEM solutions to enable timely detection of exploitation attempts. Finally, educate users about the risks of privilege misuse and enforce strong authentication and session management to reduce the likelihood of account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T19:12:25.102Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e812b0e7acb8066fb4462

Added to database: 11/7/2025, 11:30:51 PM

Last enriched: 11/15/2025, 12:22:12 AM

Last updated: 12/21/2025, 9:42:25 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats