Home

Description

kotaemon is an open-source RAG-based tool for document comprehension. From versions 0.10.6 and prior, in libs/ktem/ktem/index/file/ui.py, the index_fn method accepts both URLs and local file paths without validation. The pipeline streams these paths directly and stores them, enabling attackers to traverse directories (e.g. ../../../../../.env) and exfiltrate sensitive files. This issue has been patched via commit 37cdc28, in version 0.10.7 which has not been made public at time of publication.

PUBLISHED Reserved 2025-06-27 | Published 2025-07-02 | Updated 2025-07-02 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

<= 0.10.6
affected

References

github.com/...taemon/security/advisories/GHSA-jw4w-xcvf-jq5x

github.com/Cinnamon/kotaemon/pull/755

github.com/...ommit/37cdc28ceb46e505d25221584daf1fe61e26b2cc

cve.org (CVE-2025-53358)

nvd.nist.gov (CVE-2025-53358)

Download JSON