All the vulnerabilites related to xlang-ai - OpenAgents
cve-2025-6282
Vulnerability from cvelistv5
Published
2025-06-19 22:00
Modified
2025-06-23 19:29
Severity ?
2.0 (Low) - CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
EPSS score ?
Summary
xlang-ai OpenAgents file.py create_upload_file path traversal
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313286 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313286 | signature, permissions-required | |
https://vuldb.com/?submit.593616 | third-party-advisory | |
https://github.com/xlang-ai/OpenAgents/issues/141 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
xlang-ai | OpenAgents |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6282", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T16:16:10.663263Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T19:29:48.205Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/xlang-ai/OpenAgents/issues/141" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenAgents", "vendor": "xlang-ai", "versions": [ { "status": "affected", "version": "ff2e46440699af1324eb25655b622c4a131265bb" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in xlang-ai OpenAgents up to ff2e46440699af1324eb25655b622c4a131265bb and classified as critical. Affected by this issue is the function create_upload_file of the file backend/api/file.py. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The reported GitHub issue was closed automatically with the label \"not planned\" by a bot." }, { "lang": "de", "value": "Eine Schwachstelle wurde in xlang-ai OpenAgents bis ff2e46440699af1324eb25655b622c4a131265bb gefunden. Sie wurde als kritisch eingestuft. Es geht hierbei um die Funktion create_upload_file der Datei backend/api/file.py. Mittels Manipulieren mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5.2, "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-19T22:00:16.250Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313286 | xlang-ai OpenAgents file.py create_upload_file path traversal", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313286" }, { "name": "VDB-313286 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313286" }, { "name": "Submit #593616 | xlang-ai OpenAgents commit ff2e464 Path Traversal", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.593616" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/xlang-ai/OpenAgents/issues/141" } ], "timeline": [ { "lang": "en", "time": "2025-06-19T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-19T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-19T09:08:06.000Z", "value": "VulDB entry last update" } ], "title": "xlang-ai OpenAgents file.py create_upload_file path traversal" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6282", "datePublished": "2025-06-19T22:00:16.250Z", "dateReserved": "2025-06-19T07:02:36.243Z", "dateUpdated": "2025-06-23T19:29:48.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }