CVE-2026-27483

HIGH NUCLEI

MindsDB <25.9.1.1 - Path Traversal

Title source: llm

Description

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. The vulnerability exists in the "Upload File" module, which corresponds to the API endpoint /api/files. Since the multipart file upload does not perform security checks on the uploaded file path, an attacker can perform path traversal by using `../` sequences in the filename field. The file write operation occurs before calling clear_filename and save_file, meaning there is no filtering of filenames or file types, allowing arbitrary content to be written to any path on the server. Version 25.9.1.1 patches the issue.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-27483
nomisec WORKING POC
by thewhiteh4t · poc
https://github.com/thewhiteh4t/cve-2026-27483

Nuclei Templates (1)

MindsDB - Remote Code Execution
HIGHVERIFIEDby thewhiteh4t
Shodan: http.title:"MindsDB"

Scores

CVSS v3 8.8
EPSS 0.1504
EPSS Percentile 94.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (2)
mindsdb/mindsdb < 25.9.1.1
pypi/mindsdb 0 - 25.9.1.1PyPI
Published Feb 24, 2026
Tracked Since Feb 24, 2026