MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available.
References
Link | Resource |
---|---|
https://github.com/Project-MONAI/MONAI/security/advisories/GHSA-x6ww-pf9m-m73m | Exploit Vendor Advisory |
Configurations
History
19 Sep 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Monai
Monai medical Open Network For Ai |
|
References | () https://github.com/Project-MONAI/MONAI/security/advisories/GHSA-x6ww-pf9m-m73m - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:monai:medical_open_network_for_ai:*:*:*:*:*:*:*:* |
09 Sep 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-09 00:15
Updated : 2025-09-19 15:25
NVD link : CVE-2025-58755
Mitre link : CVE-2025-58755
CVE.ORG link : CVE-2025-58755
JSON object : View
Products Affected
monai
- medical_open_network_for_ai
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')