In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dbgpt
Dbgpt db-gpt |
|
CPEs | cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:* | |
Vendors & Products |
Dbgpt
Dbgpt db-gpt |
|
Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory. | |
Title | Arbitrary File Write via DuckDB SQL Injection in eosphoros-ai/db-gpt | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:40.856Z
Updated: 2025-03-20T18:36:09.245Z
Reserved: 2024-11-05T19:45:21.391Z
Link: CVE-2024-10901

Updated: 2025-03-20T17:53:27.358Z

Status : Analyzed
Published: 2025-03-20T10:15:20.997
Modified: 2025-07-17T13:40:42.147
Link: CVE-2024-10901

No data.