Impact
The vulnerability resides in InstructLab’s chat session handler where a local attacker can manipulate the logs_dir parameter to perform a path traversal. This flaw allows creation of new directories and writing files to any location on the system, potentially leading to unauthorized data modification or disclosure. The weakness is characterized as CWE-22 (Path Traversal).
Affected Systems
The affected product is Red Hat Enterprise Linux AI (RHEL AI) version 3.
Risk and Exploitability
The CVSS score of 7.1 indicates a moderate severity; the EPSS score is currently unavailable and the issue is not listed in CISA KEV. The likely attack vector is local; an attacker with sufficient privileges to access the chat session handler can supply crafted logs_dir values to cause arbitrary file write or directory creation. No official patch or workaround is available at this time, so the risk persists until a vendor fix is released or mitigations are applied.
OpenCVE Enrichment