An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.
{
"nvd_published_at": "2025-12-12T17:15:45Z",
"github_reviewed_at": "2025-12-12T20:25:25Z",
"cwe_ids": [
"CWE-22",
"CWE-61"
],
"severity": "HIGH",
"github_reviewed": true
}