An issue was discovered in Cinnamon kotaemon 0.11.0. The _may_extract_zip function in the \libs\ktem\ktem\index\file\ui.py file does not check the contents of uploaded ZIP files. Although the contents are extracted into a temporary folder that is cleared before each extraction, successfully uploading a ZIP bomb could still cause the server to consume excessive resources during decompression. Moreover, if no further files are uploaded afterward, the extracted data could occupy disk space and potentially render the system unavailable. Anyone with permission to upload files can carry out this attack.
References
| Link | Resource |
|---|---|
| https://github.com/Cinnamon/kotaemon | Product |
| https://github.com/WxDou/CVE-2025-63914 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-24 20:15
Updated : 2025-12-30 17:33
NVD link : CVE-2025-63914
Mitre link : CVE-2025-63914
CVE.ORG link : CVE-2025-63914
JSON object : View
Products Affected
cinnamon
- kotaemon
CWE
CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
