NIXPKGS-2025-0004
published on
Permalink
CVE-2025-10854
8.1 HIGH
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): High (H)
- Privileges Required (PR): None (N)
- User Interaction (UI): None (N)
- Scope (S): Unchanged (U)
- Confidentiality (C): High (H)
- Integrity (I): High (H)
- Availability (A): High (H)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): High (H)
- Modified Privileges Required (MPR): None (N)
- Modified User Interaction (MUI): None (N)
- Modified Confidentiality (MC): High (H)
- Modified Scope (MS): Unchanged (U)
- Modified Integrity (MI): High (H)
- Modified Availability (MA): High (H)
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
2 packages
- python312Packages.llama-index-readers-txtai
- python313Packages.llama-index-readers-txtai
- @LeSuisse accepted
- @LeSuisse published on GitHub
Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices
The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices
References
Affected products
txtai
- =<9.0.0
Matching in nixpkgs
pkgs.python312Packages.txtai
Semantic search and workflows powered by language models
pkgs.python313Packages.txtai
Semantic search and workflows powered by language models
Ignored packages (2)
pkgs.python312Packages.llama-index-readers-txtai
LlamaIndex Readers Integration for txtai
pkgs.python313Packages.llama-index-readers-txtai
LlamaIndex Readers Integration for txtai
Package maintainers
-
@happysalada Raphael Megzari <raphael@megzari.com>