<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:linuxfoundation:onnx:1.17.0:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3alinuxfoundationonnx1.17.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 23 May 2026 07:59:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3alinuxfoundationonnx1.17.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>ONNX Path Traversal Vulnerability (CVE-2025-51480)</title><link>https://feed.craftedsignal.io/briefs/2026-05-onnx-path-traversal/</link><pubDate>Sat, 23 May 2026 07:59:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-onnx-path-traversal/</guid><description>CVE-2025-51480 is a path traversal vulnerability in ONNX 1.17.0 that allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2025-51480, exists within the onnx.external_data_helper.save_external_data component of ONNX (Open Neural Network Exchange) version 1.17.0. This flaw enables a malicious actor to overwrite arbitrary files on the system by crafting a specific external_data.location path. This crafted path incorporates traversal sequences (e.g., &ldquo;../&rdquo;) which are designed to bypass intended directory restrictions. This vulnerability can be exploited if an attacker can control the external data location, potentially leading to arbitrary file overwrite and subsequent system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious ONNX model containing a specially crafted <code>external_data.location</code> path.</li>
<li>The crafted <code>external_data.location</code> path includes path traversal sequences (e.g., &ldquo;../&rdquo;) to navigate outside the intended directory.</li>
<li>The attacker provides this malicious ONNX model to a system running ONNX 1.17.0.</li>
<li>The vulnerable <code>onnx.external_data_helper.save_external_data</code> function processes the malicious model.</li>
<li>Due to the path traversal vulnerability, the function bypasses intended directory restrictions.</li>
<li>The function attempts to save external data to the attacker-controlled path specified in the <code>external_data.location</code> field.</li>
<li>The attacker overwrites arbitrary files on the system with attacker-controlled data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-51480 allows an attacker to overwrite arbitrary files on the system where ONNX 1.17.0 is installed. This can lead to various malicious outcomes, including modification of critical system files, planting backdoors, or corrupting application data. The potential impact ranges from denial of service to complete system compromise, depending on the nature of the overwritten files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of ONNX that addresses CVE-2025-51480.</li>
<li>Apply input validation and sanitization to any user-supplied or external data used to construct file paths within ONNX models.</li>
<li>Deploy the Sigma rule detecting path traversal attempts to the webserver logs.</li>
<li>Monitor file system events for suspicious file overwrites, especially involving files referenced in the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-overwrite</category><category>onnx</category></item></channel></rss>