A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Stitionai
Stitionai devika |
|
CPEs | cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Stitionai
Stitionai devika |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-27T17:33:35.488Z
Updated: 2024-08-01T21:18:06.450Z
Reserved: 2024-05-30T19:10:14.492Z
Link: CVE-2024-5547

Updated: 2024-08-01T21:18:06.450Z

Status : Analyzed
Published: 2024-06-27T18:15:20.493
Modified: 2025-07-15T15:37:21.163
Link: CVE-2024-5547

No data.