CRITICALCVE-2025-67506CVSS 9.8

PipesHub Vulnerable to Path Traversal through Unauthenticated Arbitrary File Upload

wordt vertaald…

Platform

python

Component

pipeshub-ai/pipeshub-ai

Opgelost in

0.1.1

AI Confidence: highNVDEPSS 0.2%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

CVE-2025-67506 describes a critical Path Traversal vulnerability affecting PipesHub versions prior to 0.1.0-beta. This vulnerability allows attackers to overwrite arbitrary files on the system, potentially leading to remote code execution and compromising the integrity of the workplace AI platform. The vulnerability is present in the /api/v1/record/buffer/convert endpoint due to insufficient authentication and improper filename normalization during file uploads. A fix is available in version 0.1.0-beta.

Python

Detecteer deze CVE in je project

Upload je requirements.txt-bestand en we vertellen je direct of je getroffen bent.

requirements.txt uploadenOndersteunde formaten: requirements.txt · Pipfile.lock

Impact en Aanvalsscenarioswordt vertaald…

The impact of CVE-2025-67506 is severe. An attacker can exploit this vulnerability to overwrite critical system files, including configuration files, executables, or even inject malicious code. This could lead to complete system compromise, data exfiltration, or denial of service. The ability to write arbitrary files grants significant control over the affected PipesHub instance and potentially the underlying infrastructure. Successful exploitation could allow an attacker to gain persistent access and pivot to other systems within the network, especially if the PipesHub service account has elevated privileges. This vulnerability shares similarities with other file upload vulnerabilities where improper filename sanitization allows for path manipulation.

Uitbuitingscontextwordt vertaald…

CVE-2025-67506 was publicly disclosed on 2025-12-10. The vulnerability’s criticality (CVSS 9.8) suggests a high probability of exploitation. No public proof-of-concept (PoC) code has been released as of this writing, but the ease of exploitation makes it a likely target for opportunistic attackers. It is not currently listed on the CISA KEV catalog. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns targeting PipesHub.

Wie Loopt Risicowordt vertaald…

Organizations utilizing PipesHub for enterprise search and workflow automation are at risk, particularly those running versions prior to 0.1.0-beta. Environments where PipesHub is deployed with elevated privileges or integrated with other critical systems are at higher risk. Shared hosting environments where multiple users share the same PipesHub instance are also vulnerable.

Detectiestappenwordt vertaald…

• python / server: Monitor system logs for unusual file creation or modification events, particularly in temporary directories. Use find /tmp -type f -mmin -60 to identify recently modified files.

find /tmp -type f -mmin -60 -print0 | xargs -0 ls -l

• generic web: Monitor access logs for requests to /api/v1/record/buffer/convert with filenames containing ../ sequences.

grep 'filename=.*\/\/' /var/log/apache2/access.log

Aanvalstijdlijn

  1. Disclosure

    disclosure

  2. Patch

    patch

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

0.22% (44% percentiel)

CISA SSVC

Exploitatiepoc
Automatiseerbaaryes
Technische Impacttotal

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityHighRisico op blootstelling van gevoelige dataIntegrityHighRisico op ongeautoriseerde gegevenswijzigingAvailabilityHighRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
Integrity
Hoog — aanvaller kan alle gegevens schrijven, aanpassen of verwijderen.
Availability
Hoog — volledige crash of uitputting van resources. Totale denial of service.

Getroffen Software

Componentpipeshub-ai/pipeshub-ai
Leverancierpipeshub-ai
Getroffen bereikOpgelost in
< 0.1.0-beta – < 0.1.0-beta0.1.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. EPSS bijgewerkt

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2025-67506 is to immediately upgrade PipesHub to version 0.1.0-beta or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restrict access to the /api/v1/record/buffer/convert endpoint using a Web Application Firewall (WAF) or proxy to block requests with suspicious filenames containing ../ sequences. Implement strict filename validation and sanitization on the server-side to prevent path traversal attempts. Review and restrict the permissions of the PipesHub service account to minimize the potential impact of a successful file overwrite. After upgrading, confirm the fix by attempting a file upload with a crafted filename containing ../ sequences; the upload should be rejected.

Hoe te verhelpenwordt vertaald…

Actualice PipesHub a la versión 0.1.0-beta o posterior. Esta versión corrige la vulnerabilidad de path traversal al validar correctamente los nombres de archivo antes de guardarlos. Alternativamente, implemente una validación robusta de los nombres de archivo en su propia implementación para evitar la escritura de archivos arbitrarios.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2025-67506 — Path Traversal in PipesHub?

CVE-2025-67506 is a critical Path Traversal vulnerability in PipesHub versions before 0.1.0-beta. It allows attackers to overwrite files by manipulating filenames, potentially leading to remote code execution.

Am I affected by CVE-2025-67506 in PipesHub?

You are affected if you are using PipesHub versions prior to 0.1.0-beta. Immediately assess your environment to determine if you are vulnerable.

How do I fix CVE-2025-67506 in PipesHub?

Upgrade PipesHub to version 0.1.0-beta or later. If immediate upgrade is not possible, implement WAF rules and filename validation as temporary mitigations.

Is CVE-2025-67506 being actively exploited?

While no public exploits are currently known, the vulnerability's criticality suggests a high probability of exploitation. Monitor threat intelligence feeds for updates.

Where can I find the official PipesHub advisory for CVE-2025-67506?

Refer to the PipesHub official security advisory for detailed information and updates regarding CVE-2025-67506.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.