Impact
A file upload endpoint in AstrBot’s dashboard allows the modification of the File argument, which the application processes without adequate sandbox protection. By manipulating this argument, an attacker can escape the intended sandbox environment and potentially execute arbitrary code on the server. The vulnerability is exploitable remotely through the web interface and has an publicly available exploit. The description does not confirm that the sandbox escape immediately results in code execution, but it clearly indicates a path for execution beyond normal boundaries.
Affected Systems
The flaw impacts AstrBotDevs AstrBot versions up to 4.22.1. Users of any older release should verify the installed version and plan to upgrade once a fix is released. No newer versions are listed as affected, so a version newer than 4.22.1 is presumed safe unless future releases reintroduce the issue.
Risk and Exploitability
The CVSS score of 5.3 reflects moderate severity. No EPSS score is available, and the vulnerability is not cataloged in CISA’s KEV list. Because the attack vector is remote and the exploit is publicly disclosed, the likelihood of exploitation is non‑negligible. Administrators should treat the exposed sandbox as a tangible risk to service integrity and potential confidentiality breaches.
OpenCVE Enrichment