Intel

AIKIDO-2026-10181

onnxruntime is vulnerable to Path Traversal

Path Traversal Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

58

Medium Risk

This Affects:

PYTHONonnxruntime
1.21.0 - 1.24.0
Fixed in 1.24.1

TL;DR

Affected versions of this package allow external data references in TensorProto to point to arbitrary file locations without enforcing that the data resides under the model directory, enabling unsafe path resolution. An attacker could craft a malicious model containing absolute paths or path traversal sequences (e.g., ../) to force the system to load unintended files from the host filesystem. This may result in unauthorized file access, sensitive data disclosure, or unintended behavior depending on the execution environment. Exploitation typically requires supplying a specially crafted model that bypasses directory validation during external data loading.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

onnxruntime is vulnerable to Path Traversal in versions 1.21.0 - 1.24.0.

How to fix this

Upgrade the onnxruntime library to the patch version.

Background Info