
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-10831 affects eosphoros-ai/db-gpt version 0.6.0, where a vulnerability in the file upload endpoint allows for absolute path traversal. The vulnerability was disclosed on March 20, 2025, and is tracked with a CVSS v3.0 base score of 9.1 (CRITICAL) (NVD).
The vulnerability stems from insufficient input validation in the file upload endpoint. The file_key and doc_file.filename parameters are user-controllable, which enables attackers to construct paths outside the intended directory. This represents an Absolute Path Traversal vulnerability (CWE-36) that could allow unauthorized file operations on the target server (NVD).
The vulnerability allows an attacker to upload arbitrary files to arbitrary locations on the target server. This could lead to overwriting essential system files, such as SSH keys, potentially enabling further system exploitation (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."