A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Stitionai
Stitionai devika |
|
CPEs | cpe:2.3:a:stitionai:devika:*:*:*:*:*:*:*:* | |
Vendors & Products |
Stitionai
Stitionai devika |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-30T00:00:13.962Z
Updated: 2024-08-01T21:25:03.166Z
Reserved: 2024-06-12T19:35:01.373Z
Link: CVE-2024-5926

Updated: 2024-08-01T21:25:03.166Z

Status : Analyzed
Published: 2024-06-30T01:15:09.707
Modified: 2025-07-10T22:32:39.373
Link: CVE-2024-5926

No data.