CVE-2025-67818: n/a
An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.
AI Analysis
Technical Summary
CVE-2025-67818 is a directory traversal vulnerability affecting Weaviate OSS versions before 1.33.4. The flaw arises from insufficient validation of entry names during the restoration of backups. Specifically, an attacker who can insert data into the Weaviate database can craft backup entries with absolute paths (e.g., /etc/passwd) or use parent directory traversal sequences (../../..) to escape the designated restore root directory. When the backup is restored, these crafted entries can cause files to be created or overwritten in arbitrary locations on the file system, constrained only by the privileges of the Weaviate application process. This can lead to unauthorized modification or creation of files, potentially compromising system integrity or confidentiality. The vulnerability requires the attacker to have the ability to insert data into the database, which may be possible through misconfigurations or compromised credentials. No authentication bypass is indicated, but the attack vector relies on the backup restore functionality processing malicious data. There are no known public exploits or patches at the time of publication, and the CVSS score has not been assigned. The vulnerability highlights the risk of insufficient input validation and improper sandboxing during backup restoration in database-driven applications.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized file modifications or overwrites on systems running vulnerable Weaviate OSS instances. This may result in data corruption, privilege escalation if critical system files are overwritten, or disruption of services relying on Weaviate. Confidentiality could be compromised if sensitive files are overwritten or replaced with malicious content. Integrity is directly impacted as attackers can alter files arbitrarily within the application's privilege scope. Availability could be affected if essential files are corrupted, causing service outages. Organizations using Weaviate for critical data management or AI-driven applications may face operational disruptions. The impact is heightened in environments where database insert permissions are widely granted or where backup restore operations are automated without strict validation. Given the lack of known exploits, the immediate risk is moderate, but the potential for damage is significant if exploited.
Mitigation Recommendations
Organizations should immediately upgrade Weaviate OSS to version 1.33.4 or later once available. Until patches are applied, restrict database insert permissions to trusted users only, minimizing the risk of malicious data insertion. Implement strict input validation and sanitization on data that can influence backup contents. Review and harden backup restore procedures to ensure they do not process entries with absolute or traversal paths. Employ file system monitoring to detect unauthorized file creations or modifications during restore operations. Use application sandboxing or run Weaviate with least privilege to limit the scope of file system access. Regularly audit backup data for suspicious entries before restoration. Additionally, consider isolating backup restore environments from production systems to contain potential damage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-67818: n/a
Description
An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.
AI-Powered Analysis
Technical Analysis
CVE-2025-67818 is a directory traversal vulnerability affecting Weaviate OSS versions before 1.33.4. The flaw arises from insufficient validation of entry names during the restoration of backups. Specifically, an attacker who can insert data into the Weaviate database can craft backup entries with absolute paths (e.g., /etc/passwd) or use parent directory traversal sequences (../../..) to escape the designated restore root directory. When the backup is restored, these crafted entries can cause files to be created or overwritten in arbitrary locations on the file system, constrained only by the privileges of the Weaviate application process. This can lead to unauthorized modification or creation of files, potentially compromising system integrity or confidentiality. The vulnerability requires the attacker to have the ability to insert data into the database, which may be possible through misconfigurations or compromised credentials. No authentication bypass is indicated, but the attack vector relies on the backup restore functionality processing malicious data. There are no known public exploits or patches at the time of publication, and the CVSS score has not been assigned. The vulnerability highlights the risk of insufficient input validation and improper sandboxing during backup restoration in database-driven applications.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized file modifications or overwrites on systems running vulnerable Weaviate OSS instances. This may result in data corruption, privilege escalation if critical system files are overwritten, or disruption of services relying on Weaviate. Confidentiality could be compromised if sensitive files are overwritten or replaced with malicious content. Integrity is directly impacted as attackers can alter files arbitrarily within the application's privilege scope. Availability could be affected if essential files are corrupted, causing service outages. Organizations using Weaviate for critical data management or AI-driven applications may face operational disruptions. The impact is heightened in environments where database insert permissions are widely granted or where backup restore operations are automated without strict validation. Given the lack of known exploits, the immediate risk is moderate, but the potential for damage is significant if exploited.
Mitigation Recommendations
Organizations should immediately upgrade Weaviate OSS to version 1.33.4 or later once available. Until patches are applied, restrict database insert permissions to trusted users only, minimizing the risk of malicious data insertion. Implement strict input validation and sanitization on data that can influence backup contents. Review and harden backup restore procedures to ensure they do not process entries with absolute or traversal paths. Employ file system monitoring to detect unauthorized file creations or modifications during restore operations. Use application sandboxing or run Weaviate with least privilege to limit the scope of file system access. Regularly audit backup data for suspicious entries before restoration. Additionally, consider isolating backup restore environments from production systems to contain potential damage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693c45b972d8eb03a613ec4a
Added to database: 12/12/2025, 4:41:29 PM
Last enriched: 12/12/2025, 4:42:46 PM
Last updated: 12/15/2025, 4:13:35 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumCVE-2025-13740: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in someguy9 Lightweight Accordion
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.