Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68430: CWE-24: Path Traversal: '../filedir' in cvat-ai cvat

0
Medium
VulnerabilityCVE-2025-68430cvecve-2025-68430cwe-24
Published: Fri Dec 19 2025 (12/19/2025, 17:11:46 UTC)
Source: CVE Database V5
Vendor/Project: cvat-ai
Product: cvat

Description

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.8.1 through 2.52.0, an attacker with an account on a CVAT instance is able to retrieve the contents of any file system directory accessible to the CVAT server. The exposed information is names of contained files and subdirectories. The contents of files are not accessible. Version 2.53.0 contains a patch. No known workarounds are available.

AI-Powered Analysis

AILast updated: 12/19/2025, 17:42:10 UTC

Technical Analysis

CVE-2025-68430 is a path traversal vulnerability (CWE-24) identified in the open-source CVAT (Computer Vision Annotation Tool) software, versions 2.8.1 through 2.52.0. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability allows an attacker who has an authenticated account on a CVAT instance to manipulate file path inputs to traverse directories on the server filesystem. This traversal enables the attacker to retrieve directory listings—names of files and subdirectories—within any directory accessible by the CVAT server process. Notably, the vulnerability does not permit reading file contents, limiting the exposure to metadata disclosure. The flaw arises from insufficient validation or sanitization of user-supplied path parameters, allowing '../' sequences to escape intended directory boundaries. The vulnerability is remotely exploitable without user interaction beyond authentication and requires low attack complexity. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, privileges required (authenticated user), no user interaction, and limited confidentiality impact. The vulnerability was publicly disclosed on December 19, 2025, and patched in CVAT version 2.53.0. No known exploits are currently observed in the wild. Given CVAT's role in AI and computer vision workflows, this vulnerability could facilitate reconnaissance activities by exposing directory structures, potentially aiding further attacks or data leakage if combined with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations, the impact primarily involves information disclosure that could assist attackers in mapping the server filesystem, identifying sensitive directories, or locating configuration files and scripts. While direct file content access is not possible, knowledge of directory contents can facilitate targeted attacks such as privilege escalation, exploitation of other vulnerabilities, or social engineering. Organizations in sectors heavily invested in AI, autonomous systems, or research institutions using CVAT for annotation tasks are at higher risk. Exposure of directory structures could also reveal operational details or intellectual property indirectly. Since exploitation requires authenticated access, insider threats or compromised user accounts pose a significant risk. The vulnerability does not directly impact system availability or integrity but can be a stepping stone in multi-stage attacks. The medium CVSS score reflects moderate risk, but the absence of known exploits suggests limited immediate threat. However, delayed patching could increase exposure, especially in environments with weak account management or where CVAT instances are internet-facing.

Mitigation Recommendations

The primary mitigation is to upgrade all CVAT instances to version 2.53.0 or later, where the vulnerability is patched. Since no workarounds exist, organizations should prioritize patch management. Additionally, implement strict access controls and monitoring on CVAT user accounts to prevent unauthorized access. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. Network segmentation should be employed to limit CVAT server exposure to trusted internal networks only. Logging and alerting on unusual directory traversal attempts or abnormal user behavior can help detect exploitation attempts. Regularly audit CVAT configurations and user permissions to minimize privilege levels. If immediate upgrade is not feasible, consider restricting CVAT access via VPN or IP whitelisting to trusted users. Finally, educate users about the risks of credential compromise and enforce password hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T15:29:39.379Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69458ae3f063e4fadf03d176

Added to database: 12/19/2025, 5:26:59 PM

Last enriched: 12/19/2025, 5:42:10 PM

Last updated: 12/19/2025, 6:30:51 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats