Impact
The CVE describes an arbitrary local file read flaw in the JSON loader component of CrewAI. The loader accepts JSON payloads and reads files without validating the file path, allowing an attacker to read any file that the CrewAI process can access. The impact is the potential disclosure of sensitive data such as configuration files, credentials, or other confidential information. The vulnerability could also be leveraged for further attacks if the attacker learns information that aids in privilege escalation or system compromise, but the primary impact is on confidentiality.
Affected Systems
All deployments of CrewAI are potentially affected because the description does not specify affected versions or exclusion criteria. This includes both self‑hosted installations and cloud‑based services where the JSON loader feature is enabled. Users should review their setup to determine if the vulnerable JSON loader is active and consider upgrading once a patch is available.
Risk and Exploitability
Exploitation requires the attacker to provide a JSON payload to the vulnerable loader, implying a local or privileged attacker with access to the CrewAI instance. The CVSS score is not reported and EPSS data is unavailable, so the exact severity cannot be quantified. The vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation. Nonetheless, because the flaw allows arbitrary file reading, an attacker could gain footholds that may lead to further compromise. No additional conditions for exploitation are provided in the available data.
OpenCVE Enrichment