Exploit for CVE-2025-64712

The unstructured library provides open-source components for ingesting and pre-processing images and text documents, such as PDFs, HTML, Word docs, and many more. Prior to version 0.18.18, a path traversal vulnerability in the partition_msg function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments. This issue has been patched in version 0.18.18.

Published: 2026-02-04

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download Exploit for CVE-2025-64712 here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

Check our portfolio:

https://veletacapital.com/exploit-280-cve-2025-67135/

https://veletacapital.com/exploit-735-cve-2026-2251/

https://veletacapital.com/exploit-282-cve-2026-26215/

https://veletacapital.com/exploit-729-cve-2025-12981/