Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64712: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Unstructured-IO unstructured

0
Critical
VulnerabilityCVE-2025-64712cvecve-2025-64712cwe-22cwe-73
Published: Wed Feb 04 2026 (02/04/2026, 17:34:51 UTC)
Source: CVE Database V5
Vendor/Project: Unstructured-IO
Product: unstructured

Description

The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.

AI-Powered Analysis

AILast updated: 02/04/2026, 18:15:34 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64712 affects the open-source 'unstructured' library developed by Unstructured-IO, which is widely used for ingesting and pre-processing various document formats including images, PDFs, HTML, Word documents, and MSG files. Specifically, the flaw resides in the partition_msg function, which handles MSG file attachments. Due to improper limitation of pathname to a restricted directory (CWE-22) and related directory traversal issues (CWE-73), an attacker can craft malicious MSG files that exploit this weakness to write or overwrite arbitrary files on the host filesystem. This can lead to full compromise of the affected system, including unauthorized data modification, code execution, or denial of service. The vulnerability requires no authentication or user interaction and can be exploited remotely by simply processing a malicious MSG file. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been observed yet, the vulnerability's characteristics make it highly exploitable. The issue was patched in version 0.18.18 of the unstructured library, and users are urged to upgrade immediately. The vulnerability impacts any system or service that uses vulnerable versions of the unstructured library for document ingestion, including automated workflows in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on automated document processing systems that incorporate the unstructured library. Successful exploitation can lead to unauthorized file writes, enabling attackers to implant malware, modify sensitive data, or disrupt critical services. This can result in data breaches, loss of data integrity, operational downtime, and potential regulatory non-compliance under GDPR due to unauthorized data manipulation or exposure. Industries such as finance, healthcare, legal, and government, which often process large volumes of documents including MSG files, are particularly vulnerable. The ability to exploit this flaw remotely without authentication increases the attack surface and risk of widespread compromise. Additionally, supply chain attacks could leverage this vulnerability to target European software vendors or service providers embedding the affected library, amplifying the impact across multiple organizations.

Mitigation Recommendations

1. Immediate upgrade to unstructured library version 0.18.18 or later to apply the official patch addressing the path traversal vulnerability. 2. Implement strict input validation and sanitization for all document ingestion workflows, especially for MSG files and their attachments, to detect and block suspicious pathnames or malformed files. 3. Employ sandboxing or containerization for document processing components to limit filesystem access and contain potential exploitation impact. 4. Monitor file system changes and logs for unusual write activities originating from document processing services. 5. Conduct thorough code audits and dependency reviews to identify and remediate other potential path traversal or directory traversal issues. 6. Restrict permissions of the service account running the unstructured library to the minimum necessary, preventing unauthorized file system modifications outside designated directories. 7. Establish incident response procedures for rapid containment and remediation if exploitation is suspected. 8. Educate development and security teams about secure handling of untrusted document inputs and the importance of timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983892af9fa50a62fa00a07

Added to database: 2/4/2026, 6:00:10 PM

Last enriched: 2/4/2026, 6:15:34 PM

Last updated: 2/6/2026, 9:37:48 PM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats