Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Sep 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aimstack
Aimstack aim |
|
| CPEs | cpe:2.3:a:aimstack:aim:3.28.0:*:*:*:*:python:*:* | |
| Vendors & Products |
Aimstack
Aimstack aim |
Tue, 22 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Tue, 22 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-07-22T00:00:00.000Z
Updated: 2025-07-22T17:40:21.597Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51463
Updated: 2025-07-22T17:38:33.625Z
Status : Analyzed
Published: 2025-07-22T16:15:30.510
Modified: 2025-09-11T16:26:40.837
Link: CVE-2025-51463
No data.