Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mastra-ai
Mastra-ai mastra |
|
Vendors & Products |
Mastra-ai
Mastra-ai mastra |
Fri, 03 Oct 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20. | |
Title | Mastra Docs MCP Server `@mastra/mcp-docs-server` Leads to Information Exposure | |
Weaknesses | CWE-548 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-03T22:37:09.027Z
Updated: 2025-10-06T15:52:03.828Z
Reserved: 2025-09-29T20:25:16.182Z
Link: CVE-2025-61685

Updated: 2025-10-06T15:51:58.284Z

Status : Awaiting Analysis
Published: 2025-10-03T23:15:29.870
Modified: 2025-10-06T14:56:47.823
Link: CVE-2025-61685

No data.