markitdown is vulnerable to Path Traversal
85
High Risk
Affected versions of the package are vulnerable to path traversal attacks when a user uploads a malicious ZIP file using the ZipConverter::convert method. An attacker can craft a ZIP archive containing files with directory traversal sequences (e.g., ../), potentially allowing them to write files outside the intended extraction directory.
You are affected if you are using a version that falls within the vulnerable range.
markitdown is vulnerable to Path Traversal in versions 0.0.1a2 - 0.0.1a3.
Upgrade the markitdown library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant