In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory.
CVE ID: CVE-2024-10901
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.1
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Vendor: eosphoros-ai
Product: eosphoros-ai/db-gpt
EPSS Score: 0.37% (probability of being exploited)
EPSS Percentile: 57.75% (scored less or equal to compared to others)
EPSS Date: 2025-04-18 (when was this score calculated)