Description
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, a path traversal vulnerability via symlink allows to read arbitrary files outside model or user-provided directory. This issue has been patched in version 1.21.0.
Published: 2026-04-01
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Exfiltration via Path Traversal
Action: Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3r9x-f23j-gc73 onnx Vulnerable to Path Traversal via Symlink
History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation onnx
CPEs cpe:2.3:a:linuxfoundation:onnx:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation onnx
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Onnx
Onnx onnx
Vendors & Products Onnx
Onnx onnx

Thu, 02 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}

threat_severity

Important


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, a path traversal vulnerability via symlink allows to read arbitrary files outside model or user-provided directory. This issue has been patched in version 1.21.0.
Title ONNX: Path Traversal via Symlink
Weaknesses CWE-23
CWE-61
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T19:09:18.474Z

Reserved: 2026-02-19T19:46:03.541Z

Link: CVE-2026-27489

cve-icon Vulnrichment

Updated: 2026-04-01T19:09:15.456Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T18:16:28.287

Modified: 2026-04-07T20:22:04.480

Link: CVE-2026-27489

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-01T17:33:51Z

Links: CVE-2026-27489 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:57:00Z

Weaknesses