CVE-2024-8438: AgentScope Path Traversal in /api/file
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21305%
CWE
Published
3/20/2025
Updated
3/20/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
agentscope | pip |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in the /api/file endpoint handled by the _get_file function. The function retrieves the 'path' parameter from request arguments and passes it directly to send_file() without any validation. There is no: 1) Path normalization, 2) Restriction to a safe base directory, or 3) Check for directory traversal sequences. This matches the CWE-22 description and the advisory's technical details about unsanitized path parameters enabling arbitrary file read.