CVE-2025-27519

CRITICAL

Cognita - Path Traversal

Title source: llm

Description

Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243.

Exploits (1)

nomisec WORKING POC 2 stars
by Diabl0xE · poc
https://github.com/Diabl0xE/CVE-2025-27519

Scores

CVSS v4 9.3
EPSS 0.0258
EPSS Percentile 85.6%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (1)
truefoundry/cognita < a78bd065e05a1b30a53a3386cc02e08c317d2243
Published Mar 07, 2025
Tracked Since Feb 18, 2026