An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hmmh-292h-3364 Weaviate OSS has path traversal vulnerability via the Shard Movement API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 12 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-12T19:14:30.844Z

Reserved: 2025-12-12T00:00:00.000Z

Link: CVE-2025-67819

cve-icon Vulnrichment

Updated: 2025-12-12T19:14:19.424Z

cve-icon NVD

Status : Received

Published: 2025-12-12T17:15:45.697

Modified: 2025-12-12T20:15:42.917

Link: CVE-2025-67819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses