ZenML is vulnerable to Path Traversal through its `PathMaterializer` class
Moderate severity
GitHub Reviewed
Published
Oct 5, 2025
to the GitHub Advisory Database
•
Updated Oct 7, 2025
Description
Published by the National Vulnerability Database
Oct 5, 2025
Published to the GitHub Advisory Database
Oct 5, 2025
Reviewed
Oct 7, 2025
Last updated
Oct 7, 2025
ZenML version 0.83.1 is affected by a path traversal vulnerability in the
PathMaterializer
class. Theload
function usesis_path_within_directory
to validate files duringdata.tar.gz
extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.References