Description
A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.
Scores
CVSS v3
9.8
EPSS
0.0008
EPSS Percentile
23.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-73
Status
published
Products (2)
invoke-ai/invoke-ai/invokeai
unspecified - latest
pypi/invokeai
0 - 6.7.0PyPI
Published
Sep 18, 2025
Tracked Since
Feb 18, 2026