Impact
The vulnerability resides in the save_report tool of OpenChatBI. An attacker can supply a crafted file_format value that is insufficiently sanitized, enabling path traversal across the filesystem. This flaw is a classic directory traversal (CWE‑22), allowing the reading of any file that the application process can access, potentially exposing sensitive configuration, credentials, or data. The impact, therefore, is the disclosure of confidential information and the compromise of data integrity.
Affected Systems
The affected product is OpenChatBI by zhongyu09. Versions prior to 0.2.2 are vulnerable; the issue was patched in 0.2.2. No specific operating system requirement is listed, implying the flaw exists wherever the tool runs.
Risk and Exploitability
The CVSS score of 8.7 classifies the flaw as high severity. EPSS indicates a probability of exploitation below 1 %, and the vulnerability is not currently listed in the CISA KEV catalog, suggesting it has not yet been widely abused. The attack vector is likely remote, as the save_report tool is exposed through the web interface or API; however, the description does not specify authentication requirements, so both authenticated and unauthenticated interactions could potentially be leveraged.
OpenCVE Enrichment
Github GHSA