A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0041}

epss

{'score': 0.00447}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T17:33:35.488Z

Updated: 2024-08-01T21:18:06.450Z

Reserved: 2024-05-30T19:10:14.492Z

Link: CVE-2024-5547

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:06.450Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T18:15:20.493

Modified: 2025-07-15T15:37:21.163

Link: CVE-2024-5547

cve-icon Redhat

No data.