Refine your search

2 vulnerabilities found for gpt_academic by binary-husky

CVE-2025-10236 (GCVE-0-2025-10236)
Vulnerability from nvd
Published
2025-09-11 01:02
Modified
2025-09-11 13:22
CWE
Summary
A vulnerability has been found in binary-husky gpt_academic up to 3.91. Impacted is the function merge_tex_files_ of the file crazy_functions/latex_fns/latex_toolbox.py of the component LaTeX File Handler. Such manipulation of the argument \input{} leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Impacted products
Vendor Product Version
binary-husky gpt_academic Version: 3.0
Version: 3.1
Version: 3.2
Version: 3.3
Version: 3.4
Version: 3.5
Version: 3.6
Version: 3.7
Version: 3.8
Version: 3.9
Version: 3.10
Version: 3.11
Version: 3.12
Version: 3.13
Version: 3.14
Version: 3.15
Version: 3.16
Version: 3.17
Version: 3.18
Version: 3.19
Version: 3.20
Version: 3.21
Version: 3.22
Version: 3.23
Version: 3.24
Version: 3.25
Version: 3.26
Version: 3.27
Version: 3.28
Version: 3.29
Version: 3.30
Version: 3.31
Version: 3.32
Version: 3.33
Version: 3.34
Version: 3.35
Version: 3.36
Version: 3.37
Version: 3.38
Version: 3.39
Version: 3.40
Version: 3.41
Version: 3.42
Version: 3.43
Version: 3.44
Version: 3.45
Version: 3.46
Version: 3.47
Version: 3.48
Version: 3.49
Version: 3.50
Version: 3.51
Version: 3.52
Version: 3.53
Version: 3.54
Version: 3.55
Version: 3.56
Version: 3.57
Version: 3.58
Version: 3.59
Version: 3.60
Version: 3.61
Version: 3.62
Version: 3.63
Version: 3.64
Version: 3.65
Version: 3.66
Version: 3.67
Version: 3.68
Version: 3.69
Version: 3.70
Version: 3.71
Version: 3.72
Version: 3.73
Version: 3.74
Version: 3.75
Version: 3.76
Version: 3.77
Version: 3.78
Version: 3.79
Version: 3.80
Version: 3.81
Version: 3.82
Version: 3.83
Version: 3.84
Version: 3.85
Version: 3.86
Version: 3.87
Version: 3.88
Version: 3.89
Version: 3.90
Version: 3.91
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-10236",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-11T13:16:37.113307Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-11T13:22:17.633Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "LaTeX File Handler"
          ],
          "product": "gpt_academic",
          "vendor": "binary-husky",
          "versions": [
            {
              "status": "affected",
              "version": "3.0"
            },
            {
              "status": "affected",
              "version": "3.1"
            },
            {
              "status": "affected",
              "version": "3.2"
            },
            {
              "status": "affected",
              "version": "3.3"
            },
            {
              "status": "affected",
              "version": "3.4"
            },
            {
              "status": "affected",
              "version": "3.5"
            },
            {
              "status": "affected",
              "version": "3.6"
            },
            {
              "status": "affected",
              "version": "3.7"
            },
            {
              "status": "affected",
              "version": "3.8"
            },
            {
              "status": "affected",
              "version": "3.9"
            },
            {
              "status": "affected",
              "version": "3.10"
            },
            {
              "status": "affected",
              "version": "3.11"
            },
            {
              "status": "affected",
              "version": "3.12"
            },
            {
              "status": "affected",
              "version": "3.13"
            },
            {
              "status": "affected",
              "version": "3.14"
            },
            {
              "status": "affected",
              "version": "3.15"
            },
            {
              "status": "affected",
              "version": "3.16"
            },
            {
              "status": "affected",
              "version": "3.17"
            },
            {
              "status": "affected",
              "version": "3.18"
            },
            {
              "status": "affected",
              "version": "3.19"
            },
            {
              "status": "affected",
              "version": "3.20"
            },
            {
              "status": "affected",
              "version": "3.21"
            },
            {
              "status": "affected",
              "version": "3.22"
            },
            {
              "status": "affected",
              "version": "3.23"
            },
            {
              "status": "affected",
              "version": "3.24"
            },
            {
              "status": "affected",
              "version": "3.25"
            },
            {
              "status": "affected",
              "version": "3.26"
            },
            {
              "status": "affected",
              "version": "3.27"
            },
            {
              "status": "affected",
              "version": "3.28"
            },
            {
              "status": "affected",
              "version": "3.29"
            },
            {
              "status": "affected",
              "version": "3.30"
            },
            {
              "status": "affected",
              "version": "3.31"
            },
            {
              "status": "affected",
              "version": "3.32"
            },
            {
              "status": "affected",
              "version": "3.33"
            },
            {
              "status": "affected",
              "version": "3.34"
            },
            {
              "status": "affected",
              "version": "3.35"
            },
            {
              "status": "affected",
              "version": "3.36"
            },
            {
              "status": "affected",
              "version": "3.37"
            },
            {
              "status": "affected",
              "version": "3.38"
            },
            {
              "status": "affected",
              "version": "3.39"
            },
            {
              "status": "affected",
              "version": "3.40"
            },
            {
              "status": "affected",
              "version": "3.41"
            },
            {
              "status": "affected",
              "version": "3.42"
            },
            {
              "status": "affected",
              "version": "3.43"
            },
            {
              "status": "affected",
              "version": "3.44"
            },
            {
              "status": "affected",
              "version": "3.45"
            },
            {
              "status": "affected",
              "version": "3.46"
            },
            {
              "status": "affected",
              "version": "3.47"
            },
            {
              "status": "affected",
              "version": "3.48"
            },
            {
              "status": "affected",
              "version": "3.49"
            },
            {
              "status": "affected",
              "version": "3.50"
            },
            {
              "status": "affected",
              "version": "3.51"
            },
            {
              "status": "affected",
              "version": "3.52"
            },
            {
              "status": "affected",
              "version": "3.53"
            },
            {
              "status": "affected",
              "version": "3.54"
            },
            {
              "status": "affected",
              "version": "3.55"
            },
            {
              "status": "affected",
              "version": "3.56"
            },
            {
              "status": "affected",
              "version": "3.57"
            },
            {
              "status": "affected",
              "version": "3.58"
            },
            {
              "status": "affected",
              "version": "3.59"
            },
            {
              "status": "affected",
              "version": "3.60"
            },
            {
              "status": "affected",
              "version": "3.61"
            },
            {
              "status": "affected",
              "version": "3.62"
            },
            {
              "status": "affected",
              "version": "3.63"
            },
            {
              "status": "affected",
              "version": "3.64"
            },
            {
              "status": "affected",
              "version": "3.65"
            },
            {
              "status": "affected",
              "version": "3.66"
            },
            {
              "status": "affected",
              "version": "3.67"
            },
            {
              "status": "affected",
              "version": "3.68"
            },
            {
              "status": "affected",
              "version": "3.69"
            },
            {
              "status": "affected",
              "version": "3.70"
            },
            {
              "status": "affected",
              "version": "3.71"
            },
            {
              "status": "affected",
              "version": "3.72"
            },
            {
              "status": "affected",
              "version": "3.73"
            },
            {
              "status": "affected",
              "version": "3.74"
            },
            {
              "status": "affected",
              "version": "3.75"
            },
            {
              "status": "affected",
              "version": "3.76"
            },
            {
              "status": "affected",
              "version": "3.77"
            },
            {
              "status": "affected",
              "version": "3.78"
            },
            {
              "status": "affected",
              "version": "3.79"
            },
            {
              "status": "affected",
              "version": "3.80"
            },
            {
              "status": "affected",
              "version": "3.81"
            },
            {
              "status": "affected",
              "version": "3.82"
            },
            {
              "status": "affected",
              "version": "3.83"
            },
            {
              "status": "affected",
              "version": "3.84"
            },
            {
              "status": "affected",
              "version": "3.85"
            },
            {
              "status": "affected",
              "version": "3.86"
            },
            {
              "status": "affected",
              "version": "3.87"
            },
            {
              "status": "affected",
              "version": "3.88"
            },
            {
              "status": "affected",
              "version": "3.89"
            },
            {
              "status": "affected",
              "version": "3.90"
            },
            {
              "status": "affected",
              "version": "3.91"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "d3do (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in binary-husky gpt_academic up to 3.91. Impacted is the function merge_tex_files_ of the file crazy_functions/latex_fns/latex_toolbox.py of the component LaTeX File Handler. Such manipulation of the argument \\input{} leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "Es wurde eine Schwachstelle in binary-husky gpt_academic bis 3.91 entdeckt. Betroffen hiervon ist die Funktion merge_tex_files_ der Datei crazy_functions/latex_fns/latex_toolbox.py der Komponente LaTeX File Handler. Durch das Manipulieren des Arguments \\input{} mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 4,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-11T01:02:07.190Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-323505 | binary-husky gpt_academic LaTeX File latex_toolbox.py merge_tex_files_ path traversal",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.323505"
        },
        {
          "name": "VDB-323505 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.323505"
        },
        {
          "name": "Submit #640977 | gpt_academic latest Absolute Path Traversal",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.640977"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/d3do-23/cvelist/blob/main/gpt_academic/Plugins_LFI.md"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-09-10T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-09-10T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-09-10T16:22:12.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "binary-husky gpt_academic LaTeX File latex_toolbox.py merge_tex_files_ path traversal"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-10236",
    "datePublished": "2025-09-11T01:02:07.190Z",
    "dateReserved": "2025-09-10T14:15:32.218Z",
    "dateUpdated": "2025-09-11T13:22:17.633Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31224 (GCVE-0-2024-31224)
Vulnerability from nvd
Published
2024-04-08 15:24
Modified
2024-08-22 20:12
Severity ?
CWE
  • CWE-502 - Deserialization of Untrusted Data
Summary
GPT Academic provides interactive interfaces for large language models. A vulnerability was found in gpt_academic versions 3.64 through 3.73. The server deserializes untrustworthy data from the client, which may risk remote code execution. Any device that exposes the GPT Academic service to the Internet is vulnerable. Version 3.74 contains a patch for the issue. There are no known workarounds aside from upgrading to a patched version.
Impacted products
Vendor Product Version
binary-husky gpt_academic Version: >= 3.64, < 3.74
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-jcjc-89wr-vv7g",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-jcjc-89wr-vv7g"
          },
          {
            "name": "https://github.com/binary-husky/gpt_academic/pull/1648",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/binary-husky/gpt_academic/pull/1648"
          },
          {
            "name": "https://github.com/binary-husky/gpt_academic/commit/8af6c0cab6d96f5c4520bec85b24802e6e823f35",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/binary-husky/gpt_academic/commit/8af6c0cab6d96f5c4520bec85b24802e6e823f35"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:binary-husky:gpt_academic:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gpt_academic",
            "vendor": "binary-husky",
            "versions": [
              {
                "lessThan": "3.74",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31224",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-09T15:55:23.348163Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-22T20:12:45.441Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "gpt_academic",
          "vendor": "binary-husky",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 3.64, \u003c 3.74"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "GPT Academic provides interactive interfaces for large language models. A vulnerability was found in gpt_academic versions 3.64 through 3.73. The server deserializes untrustworthy data from the client, which may risk remote code execution. Any device that exposes the GPT Academic service to the Internet is vulnerable. Version 3.74 contains a patch for the issue. There are no known workarounds aside from upgrading to a patched version."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-08T15:24:01.084Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-jcjc-89wr-vv7g",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-jcjc-89wr-vv7g"
        },
        {
          "name": "https://github.com/binary-husky/gpt_academic/pull/1648",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/binary-husky/gpt_academic/pull/1648"
        },
        {
          "name": "https://github.com/binary-husky/gpt_academic/commit/8af6c0cab6d96f5c4520bec85b24802e6e823f35",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/binary-husky/gpt_academic/commit/8af6c0cab6d96f5c4520bec85b24802e6e823f35"
        }
      ],
      "source": {
        "advisory": "GHSA-jcjc-89wr-vv7g",
        "discovery": "UNKNOWN"
      },
      "title": "GPT Academic: Pickle deserializing cookies may pose RCE risk"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31224",
    "datePublished": "2024-04-08T15:24:01.084Z",
    "dateReserved": "2024-03-29T14:16:31.902Z",
    "dateUpdated": "2024-08-22T20:12:45.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}