CVE-2025-67819

4.9 MEDIUM

📋 TL;DR

This vulnerability in Weaviate OSS allows attackers to read arbitrary files accessible to the service process when specific conditions are met. It affects Weaviate instances where the FileReplicationService is reachable and a shard is in the 'Pause file activity' state. Organizations running vulnerable versions of Weaviate OSS are at risk.

💻 Affected Systems

Products:
  • Weaviate OSS
Versions: All versions before 1.33.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FileReplicationService to be reachable and a shard to be in 'Pause file activity' state for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive files accessible to the Weaviate process, potentially including configuration files, credentials, or other sensitive data stored on the server.

🟠

Likely Case

Unauthorized reading of files within the Weaviate process's access permissions, potentially exposing configuration data or other sensitive information.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized access to the FileReplicationService.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions: attacker must be able to call GetFile method while shard is in 'Pause file activity' state and FileReplicationService is reachable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.33.4

Vendor Advisory: https://weaviate.io/blog/weaviate-security-release-november-2025

Restart Required: Yes

Instructions:

1. Backup your Weaviate data and configuration. 2. Stop the Weaviate service. 3. Update to Weaviate version 1.33.4 or later. 4. Restart the Weaviate service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict FileReplicationService Access

linux

Limit network access to the FileReplicationService to only trusted sources.

# Use firewall rules to restrict access to FileReplicationService port
# Example: iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
# iptables -A INPUT -p tcp --dport [PORT] -j DROP

Monitor Shard States

all

Implement monitoring for shards entering 'Pause file activity' state and alert on suspicious activity.

# Monitor Weaviate logs for shard state changes
# grep -i 'pause.*file.*activity' /var/log/weaviate/*.log

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Weaviate instances from untrusted networks.
  • Apply principle of least privilege to Weaviate service account and file system permissions.

🔍 How to Verify

Check if Vulnerable:

Check Weaviate version: if running version earlier than 1.33.4, the system is vulnerable.

Check Version:

weaviate --version

Verify Fix Applied:

Verify the installed Weaviate version is 1.33.4 or later and check that the FileReplicationService has proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GetFile method calls
  • Shard state changes to 'Pause file activity' followed by file access attempts
  • File access errors or permission denials from unexpected sources

Network Indicators:

  • Unusual traffic patterns to FileReplicationService port
  • Connection attempts from unauthorized sources to Weaviate services

SIEM Query:

source="weaviate" AND ("GetFile" OR "Pause file activity")

🔗 References

📤 Share & Export