Path Traversal Vulnerability in ZenML by ZenML IO
CVE-2025-8406

6.3MEDIUM

Key Information:

Vendor

Zenml-io

Vendor
CVE Published:
5 October 2025

What is CVE-2025-8406?

ZenML version 0.83.1 suffers from a path traversal vulnerability located in the PathMaterializer class. The load function's reliance on is_path_within_directory to validate files during the extraction of data.tar.gz is ineffective against various symbolic and hard link manipulations. This oversight allows for arbitrary file writing, which can lead to serious security risks, including potential arbitrary command execution if critical system files are compromised.

Affected Version(s)

zenml-io/zenml < 0.84.2

References

CVSS V3.0

Score:
6.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-8406 : Path Traversal Vulnerability in ZenML by ZenML IO