CVE-2025-64712
Published: 04 February 2026
Summary
CVE-2025-64712 is a critical-severity Path Traversal (CWE-22) vulnerability in Unstructured Unstructured. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely remediation of the known path traversal flaw in unstructured library versions prior to 0.18.18 by applying the available patch.
Requires validation of file paths in MSG attachments to block path traversal attempts during document ingestion.
Provides integrity checks to detect unauthorized file writes or overwrites caused by exploitation of the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability enables unauthenticated remote exploitation of document processing library via crafted MSG files for arbitrary file writes, directly mapping to T1190: Exploit Public-Facing Application.
NVD Description
The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write…
more
or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.
Deeper analysisAI
CVE-2025-64712 is a path traversal vulnerability (CWE-22, CWE-73) in the partition_msg function of the unstructured open-source library, which provides components for ingesting and preprocessing images and text documents such as PDFs, HTML, and Word files. Versions prior to 0.18.18 are affected, enabling attackers to write or overwrite arbitrary files on the filesystem when processing malicious MSG files containing attachments. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), reflecting network accessibility, low attack complexity, no privileges or user interaction required, and high impacts on confidentiality, integrity, and availability.
Any unauthenticated remote attacker can exploit this flaw by supplying a specially crafted MSG file to an application using the vulnerable library for document processing. Successful exploitation allows arbitrary file writes or overwrites on the target filesystem, potentially leading to remote code execution, data corruption, or persistence if critical files like configuration or executables are targeted.
The issue was addressed in unstructured version 0.18.18 via a patch detailed in the commit at https://github.com/Unstructured-IO/unstructured/commit/b01d35b2373fd087d2e15162b9c021663c97155d. Additional guidance is available in the GitHub security advisory at https://github.com/Unstructured-IO/unstructured/security/advisories/GHSA-gm8q-m8mv-jj5m, recommending immediate upgrades to the patched version and validation of input files.
Details
- CWE(s)