CVE-2024-10831
Python vulnerability analysis and mitigation

Overview

CVE-2024-10831 affects eosphoros-ai/db-gpt version 0.6.0, where a vulnerability in the file upload endpoint allows for absolute path traversal. The vulnerability was disclosed on March 20, 2025, and is tracked with a CVSS v3.0 base score of 9.1 (CRITICAL) (NVD).

Technical details

The vulnerability stems from insufficient input validation in the file upload endpoint. The file_key and doc_file.filename parameters are user-controllable, which enables attackers to construct paths outside the intended directory. This represents an Absolute Path Traversal vulnerability (CWE-36) that could allow unauthorized file operations on the target server (NVD).

Impact

The vulnerability allows an attacker to upload arbitrary files to arbitrary locations on the target server. This could lead to overwriting essential system files, such as SSH keys, potentially enabling further system exploitation (NVD).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management