Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6904 | A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server. |
Github GHSA |
GHSA-f4hc-q562-cc5r | AgentScope Path Traversal in /api/file |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 Aug 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:modelscope:agentscope:0.0.4:*:*:*:*:*:*:* |
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server. | |
| Title | Path Traversal in modelscope/agentscope | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T18:34:01.364Z
Reserved: 2024-09-04T18:24:42.199Z
Link: CVE-2024-8438
Updated: 2025-03-20T17:52:56.134Z
Status : Analyzed
Published: 2025-03-20T10:15:42.240
Modified: 2025-08-01T01:49:54.507
Link: CVE-2024-8438
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:14:16Z
EUVD
Github GHSA