MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. The extractall function `zip_file.extractall(output_dir)` is used directly to process compressed files. It is used in many places in the project. In versions up to and including 1.5.0, when the Zip file containing malicious content is decompressed, it overwrites the system files. In addition, the project allows the download of the zip content through the link, which increases the scope of exploitation of this vulnerability. As of time of publication, no known fixed versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/Project-MONAI/MONAI/security/advisories/GHSA-x6ww-pf9m-m73m | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-09-09 00:15
Updated : 2025-09-19 15:25
NVD link : CVE-2025-58755
Mitre link : CVE-2025-58755
CVE.ORG link : CVE-2025-58755
JSON object : View
Products Affected
monai
- medical_open_network_for_ai
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
