Description
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. The vulnerability exists in the "Upload File" module, which corresponds to the API endpoint /api/files. Since the multipart file upload does not perform security checks on the uploaded file path, an attacker can perform path traversal by using `../` sequences in the filename field. The file write operation occurs before calling clear_filename and save_file, meaning there is no filtering of filenames or file types, allowing arbitrary content to be written to any path on the server. Version 25.9.1.1 patches the issue.
Published: 2026-02-24
Score: 8.8 High
EPSS: 16.3% Moderate
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

MindsDB’s /api/files endpoint permits authenticated users to upload files without proper sanitization of the filename. The lack of checks on path traversal sequences, such as "../", allows an attacker to write arbitrary files to any location on the server. By crafting a specially named upload, an attacker can inject executable content and then invoke remote commands, leading to full remote code execution on the underlying host. This flaw is an example of a path traversal vulnerability (CWE-22) that directly compromises confidentiality, integrity, and availability of the system.

Affected Systems

The affected product is MindsDB, the data‑science platform by MindsDB. All releases prior to version 25.9.1.1 are vulnerable, as the issue exists in the Upload File module of the /api/files endpoint. Versions 25.9.1.1 and later contain the fix and are not impacted.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability with a high impact when exploited. The EPSS score of 16% shows that the likelihood of exploitation is significant, especially in environments that expose the API to authenticated users. Although the vulnerability is not listed in CISA’s KEV catalog, the combination of an authenticated attack vector and the ability to write arbitrary files gives an attacker direct control over the server. Successful exploitation would allow arbitrary code execution, enabling the attacker to gain persistence, exfiltrate data, or leverage the system for further attacks.

Generated by OpenCVE AI on April 16, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MindsDB to version 25.9.1.1 or later to apply the vendor patch.
  • Restrict the /api/files endpoint to a minimal set of trusted administrators and audit their usage; enforce principle of least privilege for API credentials.
  • Enable logging and alerts for anomalous upload patterns that include path traversal sequences or unusually large file paths, and consider a WAF rule to block "../" sequences until patching is complete.

Generated by OpenCVE AI on April 16, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4894-xqv6-vrfq MindsDB: Path Traversal in /api/files Leading to Remote Code Execution
History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mindsdb
Mindsdb mindsdb
Vendors & Products Mindsdb
Mindsdb mindsdb

Tue, 24 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. The vulnerability exists in the "Upload File" module, which corresponds to the API endpoint /api/files. Since the multipart file upload does not perform security checks on the uploaded file path, an attacker can perform path traversal by using `../` sequences in the filename field. The file write operation occurs before calling clear_filename and save_file, meaning there is no filtering of filenames or file types, allowing arbitrary content to be written to any path on the server. Version 25.9.1.1 patches the issue.
Title MindsDB has Path Traversal in /api/files Leading to Remote Code Execution
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-27T18:19:11.743Z

Reserved: 2026-02-19T19:46:03.540Z

Link: CVE-2026-27483

cve-icon Vulnrichment

Updated: 2026-02-27T18:19:08.302Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T15:21:38.060

Modified: 2026-02-26T15:35:44.480

Link: CVE-2026-27483

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:30:15Z

Weaknesses