eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, which is commonly used as a separator in Windows paths. This vulnerability allows attackers to delete any files on the host system by manipulating the 'plugin_repo_name' variable.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dbgpt
Dbgpt db-gpt |
|
CPEs | cpe:2.3:a:dbgpt:db-gpt:0.6.1:*:*:*:*:*:*:* | |
Vendors & Products |
Dbgpt
Dbgpt db-gpt |
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, which is commonly used as a separator in Windows paths. This vulnerability allows attackers to delete any files on the host system by manipulating the 'plugin_repo_name' variable. | |
Title | Arbitrary File Deletion in eosphoros-ai/DB-GPT | |
Weaknesses | CWE-73 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:08:51.430Z
Updated: 2025-03-20T19:01:35.215Z
Reserved: 2025-01-13T23:15:01.256Z
Link: CVE-2025-0452

Updated: 2025-03-20T17:54:48.364Z

Status : Analyzed
Published: 2025-03-20T10:15:52.890
Modified: 2025-07-17T15:56:28.003
Link: CVE-2025-0452

No data.