Safety vulnerability ID: 76225
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the PyTorch-Lightning package are vulnerable to Path Traversal due to insufficient validation of user-supplied filenames. The `/api/v1/upload_file/` endpoint in the LightningApp component on Windows hosts fails to sanitize the filename parameter, allowing directory traversal sequences to escape the intended upload directory.
Latest version: 2.5.5
PyTorch Lightning is the lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application