UNIX Symbolic Link (Symlink) Following Affecting txtai package, versions [,9.0.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-TXTAI-13003831
  • published22 Sept 2025
  • disclosed22 Sept 2025
  • creditOri Hollander

Introduced: 22 Sep 2025

NewCVE-2025-10854  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade txtai to version 9.0.1 or higher.

Overview

txtai is an All-in-one open-source AI framework for semantic search, LLM orchestration and language model workflows

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following via the validate function due to improper sanitization of symbolic links within the tar file. An attacker can write arbitrary files to any location on the filesystem by including symbolic links within a compressed tar file that is loaded as an embedding index.

Note:

This is only exploitable if txtai is used to load untrusted embedding indices.

CVSS Base Scores

version 4.0
version 3.1