The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices
Metrics
Affected Vendors & Products
References
History
Mon, 22 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Sep 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices | |
| Title | Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published: 2025-09-22T12:04:51.805Z
Updated: 2025-09-22T12:25:15.720Z
Reserved: 2025-09-22T11:54:19.203Z
Link: CVE-2025-10854
Updated: 2025-09-22T12:25:12.633Z
Status : Awaiting Analysis
Published: 2025-09-22T13:16:01.347
Modified: 2025-09-22T21:22:33.590
Link: CVE-2025-10854
No data.