Weaviate OSS has path traversal vulnerability via the Shard Movement API
High severity
GitHub Reviewed
Published
Dec 12, 2025
to the GitHub Advisory Database
•
Updated Dec 12, 2025
Package
Affected versions
>= 1.30.0, < 1.30.20
>= 1.31.0-rc.0, < 1.31.19
>= 1.32.0-rc.0, < 1.32.16
>= 1.33.0-rc.0, < 1.33.4
Patched versions
1.30.20
1.31.19
1.32.16
1.33.4
Description
Published by the National Vulnerability Database
Dec 12, 2025
Published to the GitHub Advisory Database
Dec 12, 2025
Reviewed
Dec 12, 2025
Last updated
Dec 12, 2025
An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.
References