CVE-2025-68430: CWE-24: Path Traversal: '../filedir' in cvat-ai cvat
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.8.1 through 2.52.0, an attacker with an account on a CVAT instance is able to retrieve the contents of any file system directory accessible to the CVAT server. The exposed information is names of contained files and subdirectories. The contents of files are not accessible. Version 2.53.0 contains a patch. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2025-68430 is a path traversal vulnerability (CWE-24) identified in the open-source CVAT (Computer Vision Annotation Tool) software, versions 2.8.1 through 2.52.0. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability allows an attacker who has an authenticated account on a CVAT instance to manipulate file path inputs to traverse directories on the server filesystem. This traversal enables the attacker to retrieve directory listings—names of files and subdirectories—within any directory accessible by the CVAT server process. Notably, the vulnerability does not permit reading file contents, limiting the exposure to metadata disclosure. The flaw arises from insufficient validation or sanitization of user-supplied path parameters, allowing '../' sequences to escape intended directory boundaries. The vulnerability is remotely exploitable without user interaction beyond authentication and requires low attack complexity. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, privileges required (authenticated user), no user interaction, and limited confidentiality impact. The vulnerability was publicly disclosed on December 19, 2025, and patched in CVAT version 2.53.0. No known exploits are currently observed in the wild. Given CVAT's role in AI and computer vision workflows, this vulnerability could facilitate reconnaissance activities by exposing directory structures, potentially aiding further attacks or data leakage if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, the impact primarily involves information disclosure that could assist attackers in mapping the server filesystem, identifying sensitive directories, or locating configuration files and scripts. While direct file content access is not possible, knowledge of directory contents can facilitate targeted attacks such as privilege escalation, exploitation of other vulnerabilities, or social engineering. Organizations in sectors heavily invested in AI, autonomous systems, or research institutions using CVAT for annotation tasks are at higher risk. Exposure of directory structures could also reveal operational details or intellectual property indirectly. Since exploitation requires authenticated access, insider threats or compromised user accounts pose a significant risk. The vulnerability does not directly impact system availability or integrity but can be a stepping stone in multi-stage attacks. The medium CVSS score reflects moderate risk, but the absence of known exploits suggests limited immediate threat. However, delayed patching could increase exposure, especially in environments with weak account management or where CVAT instances are internet-facing.
Mitigation Recommendations
The primary mitigation is to upgrade all CVAT instances to version 2.53.0 or later, where the vulnerability is patched. Since no workarounds exist, organizations should prioritize patch management. Additionally, implement strict access controls and monitoring on CVAT user accounts to prevent unauthorized access. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. Network segmentation should be employed to limit CVAT server exposure to trusted internal networks only. Logging and alerting on unusual directory traversal attempts or abnormal user behavior can help detect exploitation attempts. Regularly audit CVAT configurations and user permissions to minimize privilege levels. If immediate upgrade is not feasible, consider restricting CVAT access via VPN or IP whitelisting to trusted users. Finally, educate users about the risks of credential compromise and enforce password hygiene.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-68430: CWE-24: Path Traversal: '../filedir' in cvat-ai cvat
Description
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.8.1 through 2.52.0, an attacker with an account on a CVAT instance is able to retrieve the contents of any file system directory accessible to the CVAT server. The exposed information is names of contained files and subdirectories. The contents of files are not accessible. Version 2.53.0 contains a patch. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-68430 is a path traversal vulnerability (CWE-24) identified in the open-source CVAT (Computer Vision Annotation Tool) software, versions 2.8.1 through 2.52.0. CVAT is widely used for interactive video and image annotation in computer vision projects. The vulnerability allows an attacker who has an authenticated account on a CVAT instance to manipulate file path inputs to traverse directories on the server filesystem. This traversal enables the attacker to retrieve directory listings—names of files and subdirectories—within any directory accessible by the CVAT server process. Notably, the vulnerability does not permit reading file contents, limiting the exposure to metadata disclosure. The flaw arises from insufficient validation or sanitization of user-supplied path parameters, allowing '../' sequences to escape intended directory boundaries. The vulnerability is remotely exploitable without user interaction beyond authentication and requires low attack complexity. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, privileges required (authenticated user), no user interaction, and limited confidentiality impact. The vulnerability was publicly disclosed on December 19, 2025, and patched in CVAT version 2.53.0. No known exploits are currently observed in the wild. Given CVAT's role in AI and computer vision workflows, this vulnerability could facilitate reconnaissance activities by exposing directory structures, potentially aiding further attacks or data leakage if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, the impact primarily involves information disclosure that could assist attackers in mapping the server filesystem, identifying sensitive directories, or locating configuration files and scripts. While direct file content access is not possible, knowledge of directory contents can facilitate targeted attacks such as privilege escalation, exploitation of other vulnerabilities, or social engineering. Organizations in sectors heavily invested in AI, autonomous systems, or research institutions using CVAT for annotation tasks are at higher risk. Exposure of directory structures could also reveal operational details or intellectual property indirectly. Since exploitation requires authenticated access, insider threats or compromised user accounts pose a significant risk. The vulnerability does not directly impact system availability or integrity but can be a stepping stone in multi-stage attacks. The medium CVSS score reflects moderate risk, but the absence of known exploits suggests limited immediate threat. However, delayed patching could increase exposure, especially in environments with weak account management or where CVAT instances are internet-facing.
Mitigation Recommendations
The primary mitigation is to upgrade all CVAT instances to version 2.53.0 or later, where the vulnerability is patched. Since no workarounds exist, organizations should prioritize patch management. Additionally, implement strict access controls and monitoring on CVAT user accounts to prevent unauthorized access. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. Network segmentation should be employed to limit CVAT server exposure to trusted internal networks only. Logging and alerting on unusual directory traversal attempts or abnormal user behavior can help detect exploitation attempts. Regularly audit CVAT configurations and user permissions to minimize privilege levels. If immediate upgrade is not feasible, consider restricting CVAT access via VPN or IP whitelisting to trusted users. Finally, educate users about the risks of credential compromise and enforce password hygiene.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T15:29:39.379Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69458ae3f063e4fadf03d176
Added to database: 12/19/2025, 5:26:59 PM
Last enriched: 12/19/2025, 5:42:10 PM
Last updated: 12/19/2025, 6:30:51 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14960: SQL Injection in code-projects Simple Blood Donor Management System
MediumCVE-2025-14959: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-14958: Heap-based Buffer Overflow in floooh sokol
MediumCVE-2025-68478: CWE-73: External Control of File Name or Path in langflow-ai langflow
HighCVE-2025-63665: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.