CVE-2025-64485

N/A Unknown

📋 TL;DR

A path traversal vulnerability in CVAT allows authenticated users with at least User role to create or overwrite files in the root of mounted file shares. If no file share is mounted, they can fill disk space in the import worker container. This affects all CVAT deployments running vulnerable versions.

💻 Affected Systems

Products:
  • CVAT (Computer Vision Annotation Tool)
Versions: 2.4.0 through 2.48.1
Operating Systems: All platforms running CVAT
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least User global role. Impact depends on file share configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious user could overwrite critical system files, execute arbitrary code via file manipulation, or cause denial of service by filling disk space.

🟠

Likely Case

Unauthorized file creation leading to disk exhaustion, data corruption, or privilege escalation through file manipulation.

🟢

If Mitigated

Limited to authenticated users only, with impact contained to file share or container storage.

🌐 Internet-Facing: MEDIUM - Requires authenticated user access but could lead to service disruption.
🏢 Internal Only: MEDIUM - Internal users with User role can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with User role or higher.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.49.0

Vendor Advisory: https://github.com/cvat-ai/cvat/security/advisories/GHSA-x396-w86c-gf6w

Restart Required: Yes

Instructions:

1. Backup your CVAT data and configuration. 2. Update CVAT to version 2.49.0 or later. 3. Restart all CVAT services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict User Role Permissions

all

Temporarily reduce permissions for User role accounts until patching is complete.

# Review and modify user role permissions in CVAT admin interface

Implement File Share Quotas

linux/windows

Set disk quotas on mounted file shares to limit potential disk exhaustion.

# For Linux: sudo setquota -u username soft hard /mount/point
# For Windows: Configure via Disk Management quotas

🧯 If You Can't Patch

  • Implement strict access controls and monitor User role activities
  • Isolate CVAT deployment and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check CVAT version via web interface or API. If version is between 2.4.0 and 2.48.1 inclusive, system is vulnerable.

Check Version:

docker exec cvat_core python manage.py --version

Verify Fix Applied:

Confirm CVAT version is 2.49.0 or later and test that User role cannot create files in root file share locations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation patterns in /share directory
  • Multiple failed file operations from User role accounts
  • Disk space alerts on CVAT containers

Network Indicators:

  • Increased API calls to file upload endpoints from User accounts

SIEM Query:

source="cvat" AND ("file creation" OR "disk full") AND user_role="User"

🔗 References

📤 Share & Export