AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function `file.save`, so that the file in the request body can be saved to any location in the file system through directory traversal.

Project Subscriptions

Vendors Products
Astrbot Subscribe
Astrbot Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xrj9-mw57-j34v AstrBot contains a directory traversal vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 05 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:astrbot:astrbot:3.5.22:*:*:*:*:*:*:*

Wed, 12 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Astrbot
Astrbot astrbot
Vendors & Products Astrbot
Astrbot astrbot

Fri, 07 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
Description AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function `file.save`, so that the file in the request body can be saved to any location in the file system through directory traversal.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-12T17:08:41.159Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57698

cve-icon Vulnrichment

Updated: 2025-11-12T17:08:35.323Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-07T17:15:47.660

Modified: 2025-12-05T20:51:03.097

Link: CVE-2025-57698

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-10T09:34:33Z

Weaknesses