Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22328 Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Sep 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Aimstack
Aimstack aim
CPEs cpe:2.3:a:aimstack:aim:3.28.0:*:*:*:*:python:*:*
Vendors & Products Aimstack
Aimstack aim

Tue, 22 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 22 Jul 2025 15:30:00 +0000

Type Values Removed Values Added
Description Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-22T17:40:21.597Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-51463

cve-icon Vulnrichment

Updated: 2025-07-22T17:38:33.625Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-22T16:15:30.510

Modified: 2025-09-11T16:26:40.837

Link: CVE-2025-51463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.