Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67819: n/a

0
Medium
VulnerabilityCVE-2025-67819cvecve-2025-67819
Published: Fri Dec 12 2025 (12/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.

AI-Powered Analysis

AILast updated: 12/19/2025, 17:44:48 UTC

Technical Analysis

CVE-2025-67819 is a vulnerability identified in Weaviate OSS, an open-source vector search engine, affecting versions prior to 1.33.4. The root cause is a lack of proper validation of the fileName field in the transfer logic, specifically within the GetFile method. This flaw can be exploited when a shard is in the "Pause file activity" state and the FileReplicationService is accessible. An attacker who can invoke the GetFile method under these conditions can perform a directory traversal attack (CWE-22), enabling them to read arbitrary files that the service process has access to. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality (C:H) without impacting integrity or availability. Although no public exploits are currently known, the vulnerability poses a risk of sensitive data exposure if exploited. The absence of patch links suggests that a fix may be forthcoming or that users should upgrade to version 1.33.4 or later where the issue is resolved.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information stored or processed by Weaviate OSS instances. Since the exploit requires high privileges and access to the FileReplicationService, insider threats or compromised accounts pose the greatest risk. Exposure of confidential files could impact data privacy compliance, including GDPR obligations, potentially resulting in regulatory penalties and reputational damage. Organizations relying on Weaviate for critical data indexing or search functionalities may face operational risks if sensitive internal files are leaked. The medium severity rating reflects the limited attack surface due to required privileges, but the potential confidentiality breach remains significant, especially for sectors handling personal or proprietary data such as finance, healthcare, and government agencies within Europe.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Upgrade Weaviate OSS to version 1.33.4 or later as soon as the patch is available to ensure the vulnerability is addressed. 2) Restrict network access to the FileReplicationService to trusted hosts only, using firewall rules or network segmentation to minimize exposure. 3) Enforce strict authentication and authorization controls to limit who can invoke the GetFile method, ensuring only necessary high-privilege users have access. 4) Implement input validation and sanitization on the fileName parameter at the application level to prevent directory traversal attempts. 5) Monitor logs for unusual GetFile method calls or access patterns during shard pause states to detect potential exploitation attempts. 6) Conduct regular security audits and penetration tests focusing on Weaviate deployments to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c45b972d8eb03a613ec4e

Added to database: 12/12/2025, 4:41:29 PM

Last enriched: 12/19/2025, 5:44:48 PM

Last updated: 2/7/2026, 12:49:21 AM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats