CVE-2025-8406

HIGH

Zenml < 0.84.2 - Path Traversal

Title source: rule
STIX 2.1

Description

ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.

Scores

CVSS v3 7.8
EPSS 0.0004
EPSS Percentile 11.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-22
Status published
Products (2)
pypi/zenml 0.81.0 - 0.84.2PyPI
zenml/zenml 0.83.1 - 0.84.2
Published Oct 05, 2025
Tracked Since Feb 18, 2026