CVE-2024-5547

HIGH

Stitionai Devika - Path Traversal

Title source: rule
STIX 2.1

Description

A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.

Scores

CVSS v3 7.5
EPSS 0.0126
EPSS Percentile 79.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-23
Status published
Products (1)
stitionai/devika 1.0
Published Jun 27, 2024
Tracked Since Feb 18, 2026