kotaemon is an open-source RAG-based tool for document comprehension. From versions 0.10.6 and prior, in libs/ktem/ktem/index/file/ui.py, the index_fn method accepts both URLs and local file paths without validation. The pipeline streams these paths directly and stores them, enabling attackers to traverse directories (e.g. ../../../../../.env) and exfiltrate sensitive files. This issue has been patched via commit 37cdc28, in version 0.10.7 which has not been made public at time of publication.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | kotaemon is an open-source RAG-based tool for document comprehension. From versions 0.10.6 and prior, in libs/ktem/ktem/index/file/ui.py, the index_fn method accepts both URLs and local file paths without validation. The pipeline streams these paths directly and stores them, enabling attackers to traverse directories (e.g. ../../../../../.env) and exfiltrate sensitive files. This issue has been patched via commit 37cdc28, in version 0.10.7 which has not been made public at time of publication. | |
Title | kotaemon Vulnerable to Path Traversal via Link Upload | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-02T15:38:35.195Z
Updated: 2025-07-02T16:00:23.131Z
Reserved: 2025-06-27T12:57:16.120Z
Link: CVE-2025-53358

Updated: 2025-07-02T16:00:20.014Z

Status : Awaiting Analysis
Published: 2025-07-02T16:15:29.280
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-53358

No data.