CWE-29

Path Traversal: '\\..\\filename'

17 CVEs Avg CVSS 8.1 MITRE
5
CRITICAL
11
HIGH
1
MEDIUM
0
LOW
9
POC
0
KEV

Monthly

CVE-2026-5627 CRITICAL Act Now

Path traversal in mintplex-labs/anything-llm (versions ≤1.9.1) allows authenticated administrators to read or delete arbitrary JSON files on the server, bypassing directory restrictions in the AgentFlows component. Exploitation requires high privileges (administrator access) but achieves cross-scope impact including leaking sensitive API keys from configuration files or destroying critical package.json files. Fixed in version 1.12.1. No public exploit identified at time of analysis, though technical details are disclosed via Huntr bounty platform.

Path Traversal Information Disclosure Denial Of Service
NVD GitHub
CVSS 3.0
9.1
EPSS
0.0%
CVE-2025-15036 CRITICAL PATCH GHSA Act Now

Path traversal in MLflow's tar.gz extraction (mlflow/mlflow versions <3.7.0) allows remote attackers to overwrite arbitrary files and potentially escape sandbox isolation via malicious archive uploads. The vulnerability affects the `extract_archive_to_dir` function which fails to validate tar member paths during extraction. Exploitation requires user interaction (CVSS UI:R) but needs no authentication (PR:N). EPSS data not provided, but no CISA KEV listing indicates no confirmed active exploitation at time of analysis. Public exploit code exists via Huntr bounty disclosure.

Path Traversal Redhat
NVD GitHub VulDB
CVSS 3.0
9.6
EPSS
0.1%
CVE-2025-66608 HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. [CVSS 7.5 HIGH]

Information Disclosure
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-2356 CRITICAL Act Now

Local File Inclusion in parisneo/lollms-webui /reinstall_extension endpoint allows authenticated users to include arbitrary local files. EPSS 0.26%.

Python RCE Lfi AI / ML
NVD GitHub
CVSS 3.0
9.6
EPSS
0.3%
CVE-2025-12790 HIGH PATCH This Month

A flaw was found in Rubygem MQTT. Rated high severity (CVSS 7.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Redhat
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2025-6209 HIGH POC PATCH This Week

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

Path Traversal Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.5
EPSS
0.1%
CVE-2024-8982 MEDIUM This Month

A Local File Inclusion (LFI) vulnerability in OpenLLM version 0.6.10 allows attackers to include files from the local server through the web application. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass
NVD
CVSS 3.0
6.2
EPSS
0.0%
CVE-2024-8859 HIGH POC PATCH THREAT This Month

A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 26.9%.

Path Traversal Mlflow AI / ML
NVD GitHub
CVSS 3.0
7.5
EPSS
26.9%
CVE-2024-8537 CRITICAL POC Act Now

A path traversal vulnerability exists in the modelscope/agentscope application, affecting all versions. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Agentscope
NVD
CVSS 3.0
9.1
EPSS
0.7%
CVE-2024-8248 HIGH POC PATCH This Week

A vulnerability in the normalizePath function in mintplex-labs/anything-llm version git 296f041 allows for path traversal, leading to arbitrary file read and write in the storage directory. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Path Traversal Privilege Escalation Anythingllm
NVD GitHub
CVSS 3.0
7.2
EPSS
0.2%
CVE-2026-5627
EPSS 0% CVSS 9.1
CRITICAL Act Now

Path traversal in mintplex-labs/anything-llm (versions ≤1.9.1) allows authenticated administrators to read or delete arbitrary JSON files on the server, bypassing directory restrictions in the AgentFlows component. Exploitation requires high privileges (administrator access) but achieves cross-scope impact including leaking sensitive API keys from configuration files or destroying critical package.json files. Fixed in version 1.12.1. No public exploit identified at time of analysis, though technical details are disclosed via Huntr bounty platform.

Path Traversal Information Disclosure Denial Of Service
NVD GitHub
CVE-2025-15036
EPSS 0% CVSS 9.6
CRITICAL PATCH Act Now

Path traversal in MLflow's tar.gz extraction (mlflow/mlflow versions <3.7.0) allows remote attackers to overwrite arbitrary files and potentially escape sandbox isolation via malicious archive uploads. The vulnerability affects the `extract_archive_to_dir` function which fails to validate tar member paths during extraction. Exploitation requires user interaction (CVSS UI:R) but needs no authentication (PR:N). EPSS data not provided, but no CISA KEV listing indicates no confirmed active exploitation at time of analysis. Public exploit code exists via Huntr bounty disclosure.

Path Traversal Redhat
NVD GitHub VulDB
CVE-2025-66608
EPSS 0% CVSS 7.5
HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. [CVSS 7.5 HIGH]

Information Disclosure
NVD
CVE-2024-2356
EPSS 0% CVSS 9.6
CRITICAL Act Now

Local File Inclusion in parisneo/lollms-webui /reinstall_extension endpoint allows authenticated users to include arbitrary local files. EPSS 0.26%.

Python RCE Lfi +1
NVD GitHub
CVE-2025-12790
EPSS 0% CVSS 7.4
HIGH PATCH This Month

A flaw was found in Rubygem MQTT. Rated high severity (CVSS 7.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Redhat
NVD GitHub
CVE-2025-6209
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

Path Traversal Llamaindex Redhat
NVD GitHub
CVE-2024-8982
EPSS 0% CVSS 6.2
MEDIUM This Month

A Local File Inclusion (LFI) vulnerability in OpenLLM version 0.6.10 allows attackers to include files from the local server through the web application. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass
NVD
CVE-2024-8859
EPSS 27% CVSS 7.5
HIGH POC PATCH THREAT This Month

A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 26.9%.

Path Traversal Mlflow AI / ML
NVD GitHub
CVE-2024-8537
EPSS 1% CVSS 9.1
CRITICAL POC Act Now

A path traversal vulnerability exists in the modelscope/agentscope application, affecting all versions. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Agentscope
NVD
CVE-2024-8248
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

A vulnerability in the normalizePath function in mintplex-labs/anything-llm version git 296f041 allows for path traversal, leading to arbitrary file read and write in the storage directory. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Path Traversal Privilege Escalation Anythingllm
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy