Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Monai medical Open Network For Ai
|
|
CPEs | cpe:2.3:a:monai:medical_open_network_for_ai:*:*:*:*:*:*:*:* | |
Vendors & Products |
Monai medical Open Network For Ai
|
Tue, 09 Sep 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Monai
Monai monai |
|
Vendors & Products |
Monai
Monai monai |
Tue, 09 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 08 Sep 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available. | |
Title | MONAI has path traversal issue that may lead to arbitrary file writes | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-09T13:29:04.890Z
Reserved: 2025-09-04T19:18:09.499Z
Link: CVE-2025-58755

Updated: 2025-09-09T13:13:13.097Z

Status : Analyzed
Published: 2025-09-09T00:15:32.257
Modified: 2025-09-19T15:25:37.963
Link: CVE-2025-58755

No data.

Updated: 2025-09-09T21:31:52Z