Home

Description

Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.

PUBLISHED Reserved 2025-09-29 | Published 2025-10-03 | Updated 2025-10-06 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-548: Exposure of Information Through Directory Listing

Product status

<= 0.13.8, < 0.13.20
affected

References

github.com/...mastra/security/advisories/GHSA-xh92-rqrq-227v

github.com/...ommit/7f2b528ba82db512d68832d2f8ad6cbc8bb46cd4

cve.org (CVE-2025-61685)

nvd.nist.gov (CVE-2025-61685)

Download JSON