Impact
The vulnerability allows an unauthenticated attacker to craft a request that forces the Rembg HTTP server to load a file as an ONNX model, potentially revealing file existence, permissions, and content through error messages. This path traversal weakness is captured by CWE‑22 and CWE‑73 and results in unauthorized read of arbitrary server files.
Affected Systems
The issue affects the danielgatis rembg tool prior to version 2.0.75. Any deployments running 2.0.74 or earlier are susceptible, regardless of operating system, when the custom model loading feature is exposed via the HTTP API.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. Exploitation requires sending a crafted HTTP request, which remote actors could perform without authentication. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not widely exploited yet. Nonetheless, the ability to read arbitrary files poses a significant confidentiality risk.
OpenCVE Enrichment
Github GHSA