Impact
The Flow Import Endpoint in eosphoros‑ai db‑gpt version 0.7.5 processes files by calling importlib.machinery.SourceFileLoader.exec_module. The implementation fails to properly sanitize the file input, allowing an attacker to supply a malicious file that is executed during import. This flaw is a code injection vulnerability that can be triggered remotely through the exposed endpoint. The weakness is represented by CWE-74 (Improper Handling of Input) and CWE-94 (Improper Evaluation of Code without Adequate Restriction). An attacker who succeeds can run arbitrary code on the host, compromising confidentiality, integrity, and availability.
Affected Systems
Only eosphoros‑ai db‑gpt version 0.7.5 is affected. No additional vendors or product variants are listed.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate impact. The exploit is publicly released but the likelihood of real‑world exploitation remains very low at present; the risk of accidental or opportunistic attacks exists nevertheless. The vulnerability is not listed in the CISA KEV catalog. Attackers can invoke the flaw by sending a crafted file to the /api/v1/serve/awel/flow/import endpoint from a remote location.
OpenCVE Enrichment