Логотип exploitDog
bind:CVE-2025-57698
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-57698

Количество 2

Количество 2

nvd логотип

CVE-2025-57698

3 месяца назад

AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function `file.save`, so that the file in the request body can be saved to any location in the file system through directory traversal.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xrj9-mw57-j34v

3 месяца назад

AstrBot contains a directory traversal vulnerability

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-57698

AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function `file.save`, so that the file in the request body can be saved to any location in the file system through directory traversal.

CVSS3: 7.5
1%
Низкий
3 месяца назад
github логотип
GHSA-xrj9-mw57-j34v

AstrBot contains a directory traversal vulnerability

1%
Низкий
3 месяца назад

Уязвимостей на страницу