
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability was discovered in allegroai/clearml version v2.0.1 (CVE-2025-8917). The vulnerability was disclosed on October 5, 2025, affecting the safe_extract function which improperly handles symbolic and hard links. This security flaw impacts the clearml Python package versions prior to 2.0.2 (NVD, Miggo).
The vulnerability exists in the safe_extract function within clearml/storage/util.py due to improper handling of symbolic and hard links in tar archives. The issue has been assigned CWE-22 (Path Traversal) with a CVSS v3.0 base score of 5.8 MEDIUM (Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N). The vulnerability allows for path traversal through improper validation of symbolic and hard links during archive extraction (NVD, Miggo).
When exploited, this vulnerability can lead to arbitrary file writes outside the intended directory. If critical files are overwritten, this could potentially result in remote code execution. The impact is particularly severe in environments where the clearml package processes untrusted archive files (NVD).
The vulnerability has been patched in clearml version 2.0.2. Users are advised to upgrade to this version or later. The fix introduces specific checks for symbolic and hard links (issym and islnk) within tar archives before extraction, ensuring that link targets do not point outside the intended extraction directory (Miggo).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."