A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.09011}

epss

{'score': 0.3087}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T17:33:24.801Z

Updated: 2024-08-01T21:11:12.417Z

Reserved: 2024-05-24T18:28:26.661Z

Link: CVE-2024-5334

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.417Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T18:15:20.223

Modified: 2025-07-15T15:37:39.700

Link: CVE-2024-5334

cve-icon Redhat

No data.