Description
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
Published: 2024-06-27
Score: 7.5 High
EPSS: 62.7% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.09011}

epss

{'score': 0.3087}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika

Subscriptions

Stitionai Devika
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:11:12.417Z

Reserved: 2024-05-24T18:28:26.661Z

Link: CVE-2024-5334

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.417Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T18:15:20.223

Modified: 2025-07-15T15:37:39.700

Link: CVE-2024-5334

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:01:20Z

Weaknesses