CVE-2025-10951
Python vulnerability analysis and mitigation

Overview

A path traversal vulnerability was identified in geyang ml-logger version 0.10.36 and prior, specifically in the loghandler function of mllogger/server.py. The vulnerability allows unauthenticated users to upload and overwrite files on the server through directory traversal. The issue was discovered and disclosed in September 2025 (NVD, VulDB).

Technical details

The vulnerability exists in the loghandler function within mllogger/server.py, which processes file uploads without proper validation. The function accepts any file upload request and processes it without validating the filename or implementing proper access controls. The vulnerability has received a CVSS v3.1 score of 7.3 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating remote exploitability with no authentication required (NVD).

Impact

The vulnerability allows attackers to write and overwrite any file on the server. This could lead to serious security compromises such as overwriting SSH authorized_keys files or modifying scheduled task files (crontab) to achieve remote code execution. The impact extends to potential system compromise and unauthorized access to server resources (GitHub).

Mitigation and workarounds

Security researchers recommend implementing proper file type validation before upload and preventing the use of directory traversal sequences (such as ../) in filenames. Users should upgrade to a patched version when available or implement strict input validation at the application level (GitHub).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-7647HIGH7.3
  • PythonPython
  • llama-index-core
NoYesSep 27, 2025
CVE-2025-10951MEDIUM6.9
  • PythonPython
  • ml-logger
NoNoSep 25, 2025
CVE-2025-59940MEDIUM6.5
  • PythonPython
  • mkdocs-include-markdown-plugin
NoYesSep 29, 2025
CVE-2025-10952MEDIUM5.5
  • PythonPython
  • ml-logger
NoNoSep 25, 2025
CVE-2025-10950MEDIUM5.3
  • PythonPython
  • ml-logger
NoNoSep 25, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management