Impact
MindsDB’s /api/files endpoint permits authenticated users to upload files without proper sanitization of the filename. The lack of checks on path traversal sequences, such as "../", allows an attacker to write arbitrary files to any location on the server. By crafting a specially named upload, an attacker can inject executable content and then invoke remote commands, leading to full remote code execution on the underlying host. This flaw is an example of a path traversal vulnerability (CWE-22) that directly compromises confidentiality, integrity, and availability of the system.
Affected Systems
The affected product is MindsDB, the data‑science platform by MindsDB. All releases prior to version 25.9.1.1 are vulnerable, as the issue exists in the Upload File module of the /api/files endpoint. Versions 25.9.1.1 and later contain the fix and are not impacted.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity vulnerability with a high impact when exploited. The EPSS score of 16% shows that the likelihood of exploitation is significant, especially in environments that expose the API to authenticated users. Although the vulnerability is not listed in CISA’s KEV catalog, the combination of an authenticated attack vector and the ability to write arbitrary files gives an attacker direct control over the server. Successful exploitation would allow arbitrary code execution, enabling the attacker to gain persistence, exfiltrate data, or leverage the system for further attacks.
OpenCVE Enrichment
Github GHSA