CVE-2024-5547

A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*

History

15 Jul 2025, 15:37

Type Values Removed Values Added
First Time Stitionai
Stitionai devika
References () https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2 - () https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2 - Patch
References () https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283 - () https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283 - Exploit, Third Party Advisory
CPE cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*

Information

Published : 2024-06-27 18:15

Updated : 2025-07-15 15:37


NVD link : CVE-2024-5547

Mitre link : CVE-2024-5547

CVE.ORG link : CVE-2024-5547


JSON object : View

Products Affected

stitionai

  • devika
CWE
CWE-23

Relative Path Traversal