CVE-2025-67818

An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.
Configurations

Configuration 1 (hide)

cpe:2.3:a:weaviate:weaviate:*:*:*:*:*:*:*:*

History

19 Dec 2025, 15:43

Type Values Removed Values Added
First Time Weaviate weaviate
Weaviate
CPE cpe:2.3:a:weaviate:weaviate:*:*:*:*:*:*:*:*
References () https://github.com/weaviate/weaviate - () https://github.com/weaviate/weaviate - Product
References () https://weaviate.io/blog/weaviate-security-release-november-2025 - () https://weaviate.io/blog/weaviate-security-release-november-2025 - Vendor Advisory

12 Dec 2025, 20:15

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

12 Dec 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-12 17:15

Updated : 2025-12-19 15:43


NVD link : CVE-2025-67818

Mitre link : CVE-2025-67818

CVE.ORG link : CVE-2025-67818


JSON object : View

Products Affected

weaviate

  • weaviate
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')