CVE-2025-64712
Unstructured-IO · Unstructured (Library)
A path traversal vulnerability in the Unstructured library's partition_msg function allows attackers to write or overwrite arbitrary files when processing malicious MSG attachments.
Executive summary
The Unstructured library is vulnerable to a critical path traversal flaw that allows unauthenticated attackers to overwrite system files by providing a malicious MSG file for processing.
Vulnerability
A path traversal flaw exists in the partition_msg function. When the library processes a specially crafted MSG file with malicious attachments, it fails to sanitize the file paths, allowing an unauthenticated attacker to write or overwrite arbitrary files on the local filesystem.
Business impact
This vulnerability carries a CVSS score of 9.8. Successful exploitation can lead to Remote Code Execution (RCE) if the attacker overwrites critical application code or configuration files. This poses a significant risk to automated data pipelines and document processing systems that handle external user input.
Remediation
Immediate Action: Upgrade the unstructured Python library to version 0.18.18 or later using your package manager (e.g., pip install --upgrade unstructured).
Proactive Monitoring: Monitor for unexpected file creation or modification events in the directories where the application processes documents.
Compensating Controls: Run document processing tasks in a restricted, sandboxed environment (like a container with a read-only root filesystem) to limit the impact of a path traversal attack.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Path traversal in a document ingestion library is a high-priority issue. Developers and system administrators must update the library immediately to version 0.18.18 to protect their data processing infrastructure.