Impact
The vulnerability resides in the download_controller of the Download Endpoint. An attacker can manipulate the file_path argument to access arbitrary files on the server, resulting in the disclosure of sensitive information. The flaw falls under Information Exposure, Improper Access Control, and Unrestricted Upload weaknesses.
Affected Systems
The affected product is FastApiAdmin, versions up to and including 2.2.0. No specific patch version is listed, but the issue is present in all releases up to 2.2.0.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low current exploitation probability in the wild. The vulnerability is not listed in the KEV catalog. However, because the attack vector is remote and an exploit is publicly available, the potential impact is significant. An attacker only needs to send a crafted request to the download endpoint to read protected files.
OpenCVE Enrichment