VYPR
Critical severityNVD Advisory· Published Mar 20, 2025· Updated Oct 15, 2025

Arbitrary File Deletion via Relative Path Traversal in aimhubio/aim

CVE-2024-8769

Description

A vulnerability in the LockManager.release_locks function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The run_hash parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the Repo._close_run() method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Arbitrary file deletion via path traversal in aimhubio/aim's LockManager.release_locks due to unsanitized run_hash parameter.

Vulnerability

Description The vulnerability resides in the LockManager.release_locks function of aimhubio/aim, specifically at commit bb76afe [1][3]. The run_hash parameter, which is user-controllable, is concatenated into a file path without proper normalization or sanitization. This allows an attacker to perform a relative path traversal attack, leading to the deletion of arbitrary files on the system [2].

Exploitation

The flaw is exposed through the Repo._close_run() method, which is accessible via the tracking server instruction API [2]. An attacker can craft a malicious run_hash containing path traversal sequences (e.g., ../) to navigate outside the intended directory. The function then uses this crafted path to specify which file to delete, effectively enabling the attacker to remove any file accessible to the user running the tracking server [1][2].

Impact

Successful exploitation allows an attacker to delete arbitrary files on the machine hosting the Aim tracking server. This could lead to denial of service by removing critical application or system files, data loss, or potential disruption of machine learning experiment tracking operations. The severity is heightened by the fact that the vulnerable function is reachable through the tracking server's API without requiring high privileges [2].

Mitigation

The vulnerability was reported through the Huntr bug bounty platform [4]. As of the last update, users should check for patched versions of aimhubio/aim that sanitize the run_hash input or apply path normalization in the LockManager.release_locks function. If no patch is available, restricting network access to the tracking server API and validating user input for path traversal patterns are recommended interim mitigations.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
aimPyPI
>= 3.15.0, <= 3.27.0

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.