Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67818: n/a

0
High
VulnerabilityCVE-2025-67818cvecve-2025-67818
Published: Fri Dec 12 2025 (12/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.

AI-Powered Analysis

AILast updated: 12/12/2025, 16:42:46 UTC

Technical Analysis

CVE-2025-67818 is a directory traversal vulnerability affecting Weaviate OSS versions before 1.33.4. The flaw arises from insufficient validation of entry names during the restoration of backups. Specifically, an attacker who can insert data into the Weaviate database can craft backup entries with absolute paths (e.g., /etc/passwd) or use parent directory traversal sequences (../../..) to escape the designated restore root directory. When the backup is restored, these crafted entries can cause files to be created or overwritten in arbitrary locations on the file system, constrained only by the privileges of the Weaviate application process. This can lead to unauthorized modification or creation of files, potentially compromising system integrity or confidentiality. The vulnerability requires the attacker to have the ability to insert data into the database, which may be possible through misconfigurations or compromised credentials. No authentication bypass is indicated, but the attack vector relies on the backup restore functionality processing malicious data. There are no known public exploits or patches at the time of publication, and the CVSS score has not been assigned. The vulnerability highlights the risk of insufficient input validation and improper sandboxing during backup restoration in database-driven applications.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized file modifications or overwrites on systems running vulnerable Weaviate OSS instances. This may result in data corruption, privilege escalation if critical system files are overwritten, or disruption of services relying on Weaviate. Confidentiality could be compromised if sensitive files are overwritten or replaced with malicious content. Integrity is directly impacted as attackers can alter files arbitrarily within the application's privilege scope. Availability could be affected if essential files are corrupted, causing service outages. Organizations using Weaviate for critical data management or AI-driven applications may face operational disruptions. The impact is heightened in environments where database insert permissions are widely granted or where backup restore operations are automated without strict validation. Given the lack of known exploits, the immediate risk is moderate, but the potential for damage is significant if exploited.

Mitigation Recommendations

Organizations should immediately upgrade Weaviate OSS to version 1.33.4 or later once available. Until patches are applied, restrict database insert permissions to trusted users only, minimizing the risk of malicious data insertion. Implement strict input validation and sanitization on data that can influence backup contents. Review and harden backup restore procedures to ensure they do not process entries with absolute or traversal paths. Employ file system monitoring to detect unauthorized file creations or modifications during restore operations. Use application sandboxing or run Weaviate with least privilege to limit the scope of file system access. Regularly audit backup data for suspicious entries before restoration. Additionally, consider isolating backup restore environments from production systems to contain potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c45b972d8eb03a613ec4a

Added to database: 12/12/2025, 4:41:29 PM

Last enriched: 12/12/2025, 4:42:46 PM

Last updated: 12/15/2025, 4:13:35 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats