A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00072}

epss

{'score': 0.00078}


Thu, 10 Jul 2025 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:*:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-30T00:00:13.962Z

Updated: 2024-08-01T21:25:03.166Z

Reserved: 2024-06-12T19:35:01.373Z

Link: CVE-2024-5926

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.166Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-30T01:15:09.707

Modified: 2025-07-10T22:32:39.373

Link: CVE-2024-5926

cve-icon Redhat

No data.