CVE-2025-8406: ZenML is vulnerable to Path Traversal through its `PathMaterializer` class
(updated )
ZenML version 0.83.1 is affected by a path traversal vulnerability in the PathMaterializer
class. The load
function uses is_path_within_directory
to validate files during data.tar.gz
extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-8406 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →