CVE-2025-6278: Upsonic is vulnerable to Path Traversal attack through its os.path.join function
(updated )
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerability affects the function os.path.join of the file markdown/server.py. The manipulation of the argument file.filename leads to path traversal. The exploit has been disclosed to the public and may be used.
References
- github.com/Upsonic/Upsonic
- github.com/Upsonic/Upsonic/blob/v0.55.6/src/upsonic/server/markdown/server/server.py
- github.com/Upsonic/Upsonic/commit/a54529acc6e4bfe28f4f5c80c058144348a306b7
- github.com/Upsonic/Upsonic/issues/356
- github.com/Upsonic/Upsonic/pull/360
- github.com/advisories/GHSA-8jf4-fcjr-68c2
- github.com/pypa/advisory-database/tree/main/vulns/upsonic/PYSEC-2025-67.yaml
- nvd.nist.gov/vuln/detail/CVE-2025-6278
- vuldb.com/?ctiid.313282
- vuldb.com/?id.313282
- vuldb.com/?submit.593096
Code Behaviors & Features
Detect and mitigate CVE-2025-6278 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →