Description
ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/a0880d64-9928-45bf-9663-2cd81582d9e7
Scores
CVSS v3
7.8
EPSS
0.0004
EPSS Percentile
11.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (2)
pypi/zenml
0.81.0 - 0.84.2PyPI
zenml/zenml
0.83.1 - 0.84.2
Published
Oct 05, 2025
Tracked Since
Feb 18, 2026