A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00445}

epss

{'score': 0.00358}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T17:33:37.825Z

Updated: 2024-08-01T21:18:06.404Z

Reserved: 2024-05-30T19:40:06.214Z

Link: CVE-2024-5548

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:06.404Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T18:15:20.733

Modified: 2025-07-15T15:37:01.543

Link: CVE-2024-5548

cve-icon Redhat

No data.