Cyber Posture

CVE-2025-64712

Critical

Published: 04 February 2026

Published
04 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write…

more

or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely remediation of the known path traversal flaw in unstructured library versions prior to 0.18.18 by applying the available patch.

prevent

Requires validation of file paths in MSG attachments to block path traversal attempts during document ingestion.

detect

Provides integrity checks to detect unauthorized file writes or overwrites caused by exploitation of the vulnerability.

Security SummaryAI

CVE-2025-64712 is a path traversal vulnerability (CWE-22, CWE-73) in the partition_msg function of the unstructured open-source library, which provides components for ingesting and preprocessing images and text documents such as PDFs, HTML, and Word files. Versions prior to 0.18.18 are affected, enabling attackers to write or overwrite arbitrary files on the filesystem when processing malicious MSG files containing attachments. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), reflecting network accessibility, low attack complexity, no privileges or user interaction required, and high impacts on confidentiality, integrity, and availability.

Any unauthenticated remote attacker can exploit this flaw by supplying a specially crafted MSG file to an application using the vulnerable library for document processing. Successful exploitation allows arbitrary file writes or overwrites on the target filesystem, potentially leading to remote code execution, data corruption, or persistence if critical files like configuration or executables are targeted.

The issue was addressed in unstructured version 0.18.18 via a patch detailed in the commit at https://github.com/Unstructured-IO/unstructured/commit/b01d35b2373fd087d2e15162b9c021663c97155d. Additional guidance is available in the GitHub security advisory at https://github.com/Unstructured-IO/unstructured/security/advisories/GHSA-gm8q-m8mv-jj5m, recommending immediate upgrades to the patched version and validation of input files.

Details

CWE(s)

Affected Products

unstructured
unstructured
≤ 0.18.18

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal vulnerability enables unauthenticated remote exploitation of document processing library via crafted MSG files for arbitrary file writes, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References