CVE-2026-21851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Project-MONAI MONAI
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.1, a Path Traversal (Zip Slip) vulnerability exists in MONAI's `_download_from_ngc_private()` function. The function uses `zipfile.ZipFile.extractall()` without path validation, while other similar download functions in the same codebase properly use the existing `safe_extract_member()` function. Commit 4014c8475626f20f158921ae0cf98ed259ae4d59 fixes this issue.
AI Analysis
Technical Summary
CVE-2026-21851 is a path traversal vulnerability categorized under CWE-22 found in the Medical Open Network for AI (MONAI) toolkit, specifically in versions up to and including 1.5.1. The vulnerability arises from the _download_from_ngc_private() function, which downloads and extracts zip archives using Python's zipfile.ZipFile.extractall() method without validating the paths of the extracted files. This improper limitation allows an attacker to craft a malicious zip archive containing file paths with directory traversal sequences (e.g., ../) that can escape the intended extraction directory. Consequently, an attacker could overwrite arbitrary files on the host system, potentially injecting malicious code or altering critical files, thereby compromising the integrity of the system. Unlike other download functions in the same codebase that use a safe_extract_member() function to validate paths, this function lacks such safeguards. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, but requiring user interaction. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a healthcare AI toolkit that processes sensitive medical imaging data poses a significant risk. The issue was resolved in a later commit (4014c8475626f20f158921ae0cf98ed259ae4d59) by implementing proper path validation during extraction. Given MONAI's role in healthcare imaging AI, exploitation could undermine the integrity of medical data processing pipelines.
Potential Impact
For European organizations, particularly those in the healthcare sector utilizing MONAI for AI-driven medical imaging, this vulnerability could lead to unauthorized modification of system files or application components. Such integrity breaches may result in corrupted medical imaging data, misdiagnosis, or disruption of AI workflows critical for patient care. The ability to write files outside the intended directory could also be leveraged to implant backdoors or malware, escalating the risk of broader system compromise. Although the vulnerability does not directly affect confidentiality or availability, the integrity impact on sensitive healthcare systems is significant. Given the reliance on AI tools in modern European healthcare infrastructure, exploitation could undermine trust in medical AI outputs and potentially violate regulatory compliance such as GDPR if patient data integrity is affected. The medium CVSS score reflects the need for caution, especially since exploitation requires user interaction, which might occur through social engineering or maliciously crafted inputs in the healthcare environment.
Mitigation Recommendations
European healthcare organizations should immediately verify their MONAI version and upgrade to versions later than 1.5.1 where the vulnerability is patched. If upgrading is not immediately feasible, organizations should audit and restrict the sources of zip archives processed by MONAI, ensuring only trusted and verified content is used. Implementing additional file system monitoring to detect unexpected file writes outside designated directories can help identify exploitation attempts. Developers and administrators should review custom integrations with MONAI to ensure no unvalidated extraction of archives occurs. Applying application-layer sandboxing or containerization for MONAI processes can limit the impact of potential exploitation. Additionally, training staff to recognize and avoid interacting with suspicious files or inputs that could trigger the vulnerable function will reduce the risk of user interaction-based exploitation. Regular security assessments and code reviews focusing on input validation and safe file handling are recommended to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Denmark, Finland
CVE-2026-21851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Project-MONAI MONAI
Description
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.1, a Path Traversal (Zip Slip) vulnerability exists in MONAI's `_download_from_ngc_private()` function. The function uses `zipfile.ZipFile.extractall()` without path validation, while other similar download functions in the same codebase properly use the existing `safe_extract_member()` function. Commit 4014c8475626f20f158921ae0cf98ed259ae4d59 fixes this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-21851 is a path traversal vulnerability categorized under CWE-22 found in the Medical Open Network for AI (MONAI) toolkit, specifically in versions up to and including 1.5.1. The vulnerability arises from the _download_from_ngc_private() function, which downloads and extracts zip archives using Python's zipfile.ZipFile.extractall() method without validating the paths of the extracted files. This improper limitation allows an attacker to craft a malicious zip archive containing file paths with directory traversal sequences (e.g., ../) that can escape the intended extraction directory. Consequently, an attacker could overwrite arbitrary files on the host system, potentially injecting malicious code or altering critical files, thereby compromising the integrity of the system. Unlike other download functions in the same codebase that use a safe_extract_member() function to validate paths, this function lacks such safeguards. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, but requiring user interaction. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a healthcare AI toolkit that processes sensitive medical imaging data poses a significant risk. The issue was resolved in a later commit (4014c8475626f20f158921ae0cf98ed259ae4d59) by implementing proper path validation during extraction. Given MONAI's role in healthcare imaging AI, exploitation could undermine the integrity of medical data processing pipelines.
Potential Impact
For European organizations, particularly those in the healthcare sector utilizing MONAI for AI-driven medical imaging, this vulnerability could lead to unauthorized modification of system files or application components. Such integrity breaches may result in corrupted medical imaging data, misdiagnosis, or disruption of AI workflows critical for patient care. The ability to write files outside the intended directory could also be leveraged to implant backdoors or malware, escalating the risk of broader system compromise. Although the vulnerability does not directly affect confidentiality or availability, the integrity impact on sensitive healthcare systems is significant. Given the reliance on AI tools in modern European healthcare infrastructure, exploitation could undermine trust in medical AI outputs and potentially violate regulatory compliance such as GDPR if patient data integrity is affected. The medium CVSS score reflects the need for caution, especially since exploitation requires user interaction, which might occur through social engineering or maliciously crafted inputs in the healthcare environment.
Mitigation Recommendations
European healthcare organizations should immediately verify their MONAI version and upgrade to versions later than 1.5.1 where the vulnerability is patched. If upgrading is not immediately feasible, organizations should audit and restrict the sources of zip archives processed by MONAI, ensuring only trusted and verified content is used. Implementing additional file system monitoring to detect unexpected file writes outside designated directories can help identify exploitation attempts. Developers and administrators should review custom integrations with MONAI to ensure no unvalidated extraction of archives occurs. Applying application-layer sandboxing or containerization for MONAI processes can limit the impact of potential exploitation. Additionally, training staff to recognize and avoid interacting with suspicious files or inputs that could trigger the vulnerable function will reduce the risk of user interaction-based exploitation. Regular security assessments and code reviews focusing on input validation and safe file handling are recommended to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T16:44:16.366Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695ee0db07b8a419a74d1653
Added to database: 1/7/2026, 10:40:27 PM
Last enriched: 1/14/2026, 11:42:32 PM
Last updated: 2/6/2026, 1:56:33 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.