Vulnerability Details CVE-2025-8406
                ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
                
                    Exploit prediction scoring system (EPSS) score
                    
                        
                            EPSS Score 0.0
                        
                    
                    
                        
                            EPSS Ranking 2.1%
                        
                    
                 
                
                    CVSS Severity
                    
                        
                            CVSS v3 Score 6.3
                        
                    
                    
                 
                
                
                
                    
                
                
                    
                        Products affected by CVE-2025-8406
                        
                            
                                
                                - 
                                    
                                    
                                        
                                            cpe:2.3:a:zenml:zenml:0.83.1