A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stitionai
Stitionai devika |
|
| CPEs | cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Stitionai
Stitionai devika |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:11:12.417Z
Reserved: 2024-05-24T18:28:26.661Z
Link: CVE-2024-5334
Updated: 2024-08-01T21:11:12.417Z
Status : Analyzed
Published: 2024-06-27T18:15:20.223
Modified: 2025-07-15T15:37:39.700
Link: CVE-2024-5334
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:01:20Z
Weaknesses