CVE-2025-68430

Source
https://cve.org/CVERecord?id=CVE-2025-68430
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68430.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68430
Aliases
  • GHSA-3g7v-xjh7-xmqx
Published
2025-12-19T17:11:46.949Z
Modified
2026-03-01T02:55:10.876484Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
CVAT vulnerable to directory traversal via mounted share listing
Details

CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.8.1 through 2.52.0, an attacker with an account on a CVAT instance is able to retrieve the contents of any file system directory accessible to the CVAT server. The exposed information is names of contained files and subdirectories. The contents of files are not accessible. Version 2.53.0 contains a patch. No known workarounds are available.

Database specific
{
    "cwe_ids": [
        "CWE-24"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68430.json"
}
References

Affected packages

Git / github.com/cvat-ai/cvat

Affected ranges

Type
GIT
Repo
https://github.com/cvat-ai/cvat
Events

Affected versions

v2.*
v2.10.0
v2.10.1
v2.10.2
v2.10.3
v2.11.0
v2.11.1
v2.11.2
v2.11.3
v2.12.0
v2.12.1
v2.13.0
v2.14.0
v2.14.1
v2.14.2
v2.14.3
v2.14.4
v2.15.0
v2.16.0
v2.16.1
v2.16.2
v2.16.3
v2.17.0
v2.18.0
v2.19.0
v2.19.1
v2.20.0
v2.21.0
v2.21.1
v2.21.2
v2.21.3
v2.22.0
v2.23.0
v2.23.1
v2.24.0
v2.25.0
v2.26.0
v2.26.1
v2.27.0
v2.28.0
v2.29.0
v2.30.0
v2.31.0
v2.32.0
v2.33.0
v2.34.0
v2.35.0
v2.36.0
v2.37.0
v2.38.0
v2.39.0
v2.40.0
v2.40.1
v2.41.0
v2.42.0
v2.43.0
v2.44.0
v2.44.1
v2.44.3
v2.45.0
v2.46.0
v2.46.1
v2.47.0
v2.48.0
v2.48.1
v2.49.0
v2.50.0
v2.51.0
v2.52.0
v2.8.1
v2.8.2
v2.9.0
v2.9.1
v2.9.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68430.json"