CVE-2024-5182

CRITICAL

mudler/localai <2.14.0 - Path Traversal

Title source: llm
STIX 2.1

Description

A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.

Scores

CVSS v3 9.1
EPSS 0.0249
EPSS Percentile 85.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (2)
go-skynet/LocalAI 0 - 2.16.0Go
mudler/localai < 2.16.0
Published Jun 20, 2024
Tracked Since Feb 18, 2026