Impact
The vulnerability arises from missing input validation in the file upload endpoint of Open Notebook v1.8.3, allowing an attacker to craft a request that causes the application to write or overwrite arbitrary files on the Docker container. This enables the modification of critical system files or the deployment of malicious binaries, potentially compromising confidentiality, integrity, and availability of the container and its host. The weakness is classified as CWE‑20, Input Validation. No mention of privilege escalation limits the attack scope to the container’s user privileges, but given the ability to write system files, it could lead to a full compromise if the container user is root.
Affected Systems
The affected product is Open Notebook. The vulnerable instance is the publicly exposed web application that accepts file uploads, running inside Docker. No specific version range is listed beyond v1.8.3, so any deployment of that version or earlier hosts the flaw.
Risk and Exploitability
The CVSS base score of 7 indicates a medium-to-high severity. The EPSS score is not available, so the probability of exploitation is unknown but the ability to write files with the container’s privileges suggests a high potential impact if the flaw is known to a threat actor. The vulnerability is not currently listed in CISA KEV, but it could be leveraged by attackers who discover or publish the path traversal vector. Attacks would likely be conducted remotely via the web interface, making this a serious threat for externally exposed deployments.
OpenCVE Enrichment