A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Stitionai
Stitionai devika |
|
CPEs | cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Stitionai
Stitionai devika |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-27T17:33:37.825Z
Updated: 2024-08-01T21:18:06.404Z
Reserved: 2024-05-30T19:40:06.214Z
Link: CVE-2024-5548

Updated: 2024-08-01T21:18:06.404Z

Status : Analyzed
Published: 2024-06-27T18:15:20.733
Modified: 2025-07-15T15:37:01.543
Link: CVE-2024-5548

No data.