Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
| Software | From | Fixed in |
|---|---|---|
| aimstack / aim | 3.28.0 | 3.28.0.x |