CVE-2025-67818: Weaviate OSS has a Path Traversal Vulnerability via Backup ZipSlip
(updated )
An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/…) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application’s privilege scope.
References
- github.com/advisories/GHSA-7v39-2hx7-7c43
- github.com/weaviate/weaviate
- github.com/weaviate/weaviate/commit/169df2dc92bc232df62e8fab0a20db2e5371f7aa
- github.com/weaviate/weaviate/commit/89c2270869e6d64f5b5276b8626c11cd816c6665
- nvd.nist.gov/vuln/detail/CVE-2025-67818
- weaviate.io/blog/weaviate-security-release-november-2025
Code Behaviors & Features
Detect and mitigate CVE-2025-67818 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →