MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Project-MONAI/MONAI/security/advisories/GHSA-x6ww-pf9m-m73m | Exploit Vendor Advisory | 
Configurations
                    History
                    19 Sep 2025, 15:25
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Monai
         Monai medical Open Network For Ai  | 
|
| References | () https://github.com/Project-MONAI/MONAI/security/advisories/GHSA-x6ww-pf9m-m73m - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:monai:medical_open_network_for_ai:*:*:*:*:*:*:*:* | 
09 Sep 2025, 00:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-09 00:15
Updated : 2025-09-19 15:25
NVD link : CVE-2025-58755
Mitre link : CVE-2025-58755
CVE.ORG link : CVE-2025-58755
JSON object : View
Products Affected
                monai
- medical_open_network_for_ai
 
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
