We found results for “”
CVE-2025-67818
Good to know:
Date: December 12, 2025
An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version github.com/weaviate/weaviate - v1.30.20;github.com/weaviate/weaviate - v1.31.19;github.com/weaviate/weaviate - v1.32.16;github.com/weaviate/weaviate - v1.33.4;https://github.com/weaviate/weaviate.git - v1.30.20;https://github.com/weaviate/weaviate.git - v1.31.19;https://github.com/weaviate/weaviate.git - v1.32.16;https://github.com/weaviate/weaviate.git - v1.33.4
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


