CVE-2025-67506 PUBLISHED

PipesHub Vulnerable to Path Traversal through Unauthenticated Arbitrary File Upload

Assigner: GitHub_M
Reserved: 08.12.2025 Published: 10.12.2025 Updated: 10.12.2025

PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename. An attacker can submit a crafted filename containing ../ sequences to write arbitrary files anywhere the service account has permission, enabling remote file overwrite or planting malicious code. This issue is fixed in version 0.1.0-beta.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor pipeshub-ai
Product pipeshub-ai
Versions
  • Version < 0.1.0-beta is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type CWE