CVE-2025-8406
EUVD-2025-3209405.10.2025, 09:15
ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| zenml | zenml | 0.83.1 ≤ 𝑥 < 0.84.2 |
𝑥
= Vulnerable software versions