Description
kotaemon is an open-source RAG-based tool for document comprehension. From versions 0.10.6 and prior, in libs/ktem/ktem/index/file/ui.py, the index_fn method accepts both URLs and local file paths without validation. The pipeline streams these paths directly and stores them, enabling attackers to traverse directories (e.g. ../../../../../.env) and exfiltrate sensitive files. This issue has been patched via commit 37cdc28, in version 0.10.7 which has not been made public at time of publication.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/Cinnamon/kotaemon/security/advisories/GHSA-jw4w-xcvf-jq5x
Issue Tracking x_refsource_misc
https://github.com/Cinnamon/kotaemon/pull/755
Scores
CVSS v3
6.5
EPSS
0.0045
EPSS Percentile
63.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (1)
Cinnamon/kotaemon
<= 0.10.6
Published
Jul 02, 2025
Tracked Since
Feb 18, 2026