CVE-2025-64712
Published: 04 February 2026
Description
The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write…
more
or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely remediation of the known path traversal flaw in unstructured library versions prior to 0.18.18 by applying the available patch.
Requires validation of file paths in MSG attachments to block path traversal attempts during document ingestion.
Provides integrity checks to detect unauthorized file writes or overwrites caused by exploitation of the vulnerability.
Security SummaryAI
CVE-2025-64712 is a path traversal vulnerability (CWE-22, CWE-73) in the partition_msg function of the unstructured open-source library, which provides components for ingesting and preprocessing images and text documents such as PDFs, HTML, and Word files. Versions prior to 0.18.18 are affected, enabling attackers to write or overwrite arbitrary files on the filesystem when processing malicious MSG files containing attachments. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), reflecting network accessibility, low attack complexity, no privileges or user interaction required, and high impacts on confidentiality, integrity, and availability.
Any unauthenticated remote attacker can exploit this flaw by supplying a specially crafted MSG file to an application using the vulnerable library for document processing. Successful exploitation allows arbitrary file writes or overwrites on the target filesystem, potentially leading to remote code execution, data corruption, or persistence if critical files like configuration or executables are targeted.
The issue was addressed in unstructured version 0.18.18 via a patch detailed in the commit at https://github.com/Unstructured-IO/unstructured/commit/b01d35b2373fd087d2e15162b9c021663c97155d. Additional guidance is available in the GitHub security advisory at https://github.com/Unstructured-IO/unstructured/security/advisories/GHSA-gm8q-m8mv-jj5m, recommending immediate upgrades to the patched version and validation of input files.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability enables unauthenticated remote exploitation of document processing library via crafted MSG files for arbitrary file writes, directly mapping to T1190: Exploit Public-Facing Application.