Description
A vulnerability has been found in eosphoros-ai DB-GPT up to 0.7.5. This issue affects the function module_plugin.refresh_plugins of the file packages/dbgpt-serve/src/dbgpt_serve/agent/hub/controller.py of the component FastAPI Endpoint. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote unrestricted file upload that may lead to arbitrary code execution
Action: Update Software
AI Analysis

Impact

A vulnerability in eosphoros-ai DB-GPT up to version 0.7.5 allows an attacker to upload arbitrary files through the FastAPI endpoint in module_plugin.refresh_plugins. Because the upload content is not validated for type or access control, an attacker could place executable files or scripts on the server and execute them, resulting in remote code execution. This is reflected by the associated CWE identifiers.

Affected Systems

The affected product is eosphoros-ai DB-GPT. Versions up to and including 0.7.5 are vulnerable. No patch information is provided, and the vendor has not yet responded.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact. The exploit is observable over the network, with no local privilege required. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog, but the public disclosure and lack of vendor response mean that attackers could still target exposed instances through the exposed FastAPI endpoint.

Generated by OpenCVE AI on March 20, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DB-GPT to a version newer than 0.7.5 once a patch is available or follow any vendor guidance.
  • If an update is not immediately possible, disable or protect the refresh_plugins endpoint with authentication, or remove the upload capability entirely.
  • Verify that the server only accepts allowed file types and implements size limits to mitigate similar upload vectors.
  • Monitor access logs for anomalous upload activity and apply network segmentation to limit exposure of the endpoint.

Generated by OpenCVE AI on March 20, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Eosphoros-ai
Eosphoros-ai db-gpt
Vendors & Products Eosphoros-ai
Eosphoros-ai db-gpt

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in eosphoros-ai DB-GPT up to 0.7.5. This issue affects the function module_plugin.refresh_plugins of the file packages/dbgpt-serve/src/dbgpt_serve/agent/hub/controller.py of the component FastAPI Endpoint. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title eosphoros-ai DB-GPT FastAPI Endpoint controller.py module_plugin.refresh_plugins unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Eosphoros-ai Db-gpt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T13:56:55.702Z

Reserved: 2026-03-20T14:03:16.786Z

Link: CVE-2026-4505

cve-icon Vulnrichment

Updated: 2026-03-25T13:56:52.533Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T20:16:50.903

Modified: 2026-03-23T14:32:02.800

Link: CVE-2026-4505

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:45Z

Weaknesses