{"id":"CVE-2025-67818","details":"An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.","aliases":["GHSA-7v39-2hx7-7c43","GO-2025-4237"],"modified":"2026-04-09T11:02:06.489197Z","published":"2025-12-12T17:15:45.583Z","related":["SUSE-SU-2026:0037-1"],"references":[{"type":"ADVISORY","url":"https://weaviate.io/blog/weaviate-security-release-november-2025"},{"type":"PACKAGE","url":"https://github.com/weaviate/weaviate"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/weaviate/weaviate","events":[{"introduced":"0"},{"fixed":"eb64dda7ca02ec06165a50be063646ac86986c4d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.33.4"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-67818.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}