CVE-2025-0851: Deep Java Library path traversal issue
(updated )
Deep Java Library (DJL) is an open-source, high-level, engine-agnostic Java framework for deep learning. DJL is designed to be easy to get started with and simple to use for Java developers. DJL provides a native Java development experience and functions like any other regular Java library.
DJL provides utilities for extracting tar and zip model archives that are used when loading models for use with DJL. These utilities were found to contain issues that do not protect against absolute path traversal during the extraction process.
References
- aws.amazon.com/security/security-bulletins/AWS-2025-003
- github.com/advisories/GHSA-jcrp-x7w3-ffmg
- github.com/deepjavalibrary/djl
- github.com/deepjavalibrary/djl/commit/7415cc5f72aae69ea9716a5e4f709af03a77a619
- github.com/deepjavalibrary/djl/security/advisories/GHSA-jcrp-x7w3-ffmg
- nvd.nist.gov/vuln/detail/CVE-2025-0851
Detect and mitigate CVE-2025-0851 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →