Impact
MONAI includes a Path Traversal (Zip Slip) flaw in the _download_from_ngc_private function, which extracts ZIP files without validating member paths, allowing an attacker to write files outside the intended extraction directory. This can lead to arbitrary file overwrite or placement of executable files, potentially compromising the underlying system. The flaw is identified as CWE‑22.
Affected Systems
Affected products are the MONAI AI toolkit from Project‑MONAI, versions up to and including 1.5.1. Users running any of these releases are susceptible to the vulnerability.
Risk and Exploitability
With a CVSS score of 5.3 and an EPSS score of less than 1 %, the current risk is moderate but the likelihood of exploitation remains low. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely require an actor with the ability to trigger the vulnerable download function, such as a system administrator or an application that invokes the function without input validation. Because the flaw arises from ZIP file handling, the attack vector is inferred to be local or internal, and error handling or path sanitization could prevent abuse.
OpenCVE Enrichment
Github GHSA