Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
References
Link | Resource |
---|---|
https://github.com/aimhubio/aim | Product |
https://github.com/aimhubio/aim/pull/3327 | Exploit Issue Tracking |
https://www.gecko.security/blog/cve-2025-51463 | Exploit Third Party Advisory |
Configurations
History
11 Sep 2025, 16:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:aimstack:aim:3.28.0:*:*:*:*:python:*:* | |
First Time |
Aimstack aim
Aimstack |
|
References | () https://github.com/aimhubio/aim - Product | |
References | () https://github.com/aimhubio/aim/pull/3327 - Exploit, Issue Tracking | |
References | () https://www.gecko.security/blog/cve-2025-51463 - Exploit, Third Party Advisory |
25 Jul 2025, 15:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
22 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-22 16:15
Updated : 2025-09-11 16:26
NVD link : CVE-2025-51463
Mitre link : CVE-2025-51463
CVE.ORG link : CVE-2025-51463
JSON object : View
Products Affected
aimstack
- aim
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')