Impact
The vulnerability resides in lakeFS’s local block adapter where path validation uses a simple string prefix check, allowing legitimate users to open files outside their allocated storage directory. Attackers can use path traversal sequences or exploit similarly named sibling directories to read or modify data in other namespaces, compromising confidentiality and integrity of stored objects. This flaw is a classic absolute path traversal (CWE‑22).
Affected Systems
The issue affects installations of lakeFS produced by treeverse, specifically versions prior to 1.77.0. No version beyond 1.77.0 is vulnerable. Disaster remediation requires updating to v1.77.0 or later.
Risk and Exploitability
The CVSS score of 8.1 indicates a high severity flaw. However, the EPSS score of less than 1% suggests a very low current probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, implying no publicly known exploits yet. The attack requires an authenticated user and the ability to issue file read/write commands through the local block adapter, so it is moderately exploitable in environments with weak access controls or where the adapter is exposed to untrusted actors.
OpenCVE Enrichment
Github GHSA