Description
A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.
References (2)
Core 2
Core References
Exploit, Issue Tracking, Patch
https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545
Scores
CVSS v3
9.1
EPSS
0.0249
EPSS Percentile
85.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
go-skynet/LocalAI
0 - 2.16.0Go
mudler/localai
< 2.16.0
Published
Jun 20, 2024
Tracked Since
Feb 18, 2026