An authenticated system user at the root, namespace, or database levels can use the DEFINE ANALYZER
statement to point to arbitrary file locations on the file system, and should the file be tab separated with two columns, the analyzer can be leveraged to exfiltrate the content.
This issue was discovered and patched during an code audit and penetration test of SurrealDB by cure53, the severity defined within cure53's preliminary finding is Low, matched by our CVSS v4 assessment.
Limited to unauthorised access to 2 column TSV files on the file system
A patch has been created that introduces a new environment variable, SURREAL_FILE_ALLOWLIST
, which contains a list of allowed file paths. When a mapping file is processed, the mapper checks if the file’s path is within one of the allowed paths.
Users unable to update may want to limit those with root, namespace, or database level users to trusted parties only.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-22" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-04-10T21:08:50Z" }