clearml is vulnerable to Path Traversal through its `safe_extract` function
Moderate severity
GitHub Reviewed
Published
Oct 5, 2025
to the GitHub Advisory Database
•
Updated Oct 7, 2025
Description
Published by the National Vulnerability Database
Oct 5, 2025
Published to the GitHub Advisory Database
Oct 5, 2025
Last updated
Oct 7, 2025
Reviewed
Oct 7, 2025
A vulnerability in clearml versions before 2.0.2 allows for path traversal due to improper handling of symbolic and hard links in the
safe_extractfunction. This flaw can lead to arbitrary file writes outside the intended directory, potentially resulting in remote code execution if critical files are overwritten.References