Vulnerabilites related to eosphoros-ai - db-gpt
CVE-2025-6772 (GCVE-0-2025-6772)
Vulnerability from cvelistv5
Published
2025-06-27 18:31
Modified
2025-06-27 19:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Path Traversal
Summary
A vulnerability was found in eosphoros-ai db-gpt up to 0.7.2. It has been classified as critical. Affected is the function import_flow of the file /api/v2/serve/awel/flow/import. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314088 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314088 | signature, permissions-required | |
https://vuldb.com/?submit.601028 | third-party-advisory | |
https://github.com/eosphoros-ai/DB-GPT/issues/2774 | exploit, issue-tracking |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
eosphoros-ai | db-gpt |
Version: 0.7.0 Version: 0.7.1 Version: 0.7.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6772", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-27T19:06:27.321942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-27T19:06:42.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "db-gpt", "vendor": "eosphoros-ai", "versions": [ { "status": "affected", "version": "0.7.0" }, { "status": "affected", "version": "0.7.1" }, { "status": "affected", "version": "0.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in eosphoros-ai db-gpt up to 0.7.2. It has been classified as critical. Affected is the function import_flow of the file /api/v2/serve/awel/flow/import. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in eosphoros-ai db-gpt bis 0.7.2 ausgemacht. Dabei betrifft es die Funktion import_flow der Datei /api/v2/serve/awel/flow/import. Mittels dem Manipulieren des Arguments File mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-27T18:31:05.585Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314088 | eosphoros-ai db-gpt import import_flow path traversal", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314088" }, { "name": "VDB-314088 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314088" }, { "name": "Submit #601028 | eosphoros-ai DB-GPT \u003c=v.0.7.2 Path Traversal", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601028" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/eosphoros-ai/DB-GPT/issues/2774" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T12:22:19.000Z", "value": "VulDB entry last update" } ], "title": "eosphoros-ai db-gpt import import_flow path traversal" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6772", "datePublished": "2025-06-27T18:31:05.585Z", "dateReserved": "2025-06-27T10:17:13.526Z", "dateUpdated": "2025-06-27T19:06:42.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }