An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.
References
| Link | Resource |
|---|---|
| https://github.com/weaviate/weaviate | Product |
| https://weaviate.io/blog/weaviate-security-release-november-2025 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-12 17:15
Updated : 2025-12-19 15:43
NVD link : CVE-2025-67818
Mitre link : CVE-2025-67818
CVE.ORG link : CVE-2025-67818
JSON object : View
Products Affected
weaviate
- weaviate
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
