We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in HKUDS LightRAG up to 1.3.8. It has been declared as critical. Affected by this vulnerability is the function upload_to_input_dir of the file lightrag/api/routers/document_routes.py of the component File Upload. The manipulation of the argument file.filename leads to path traversal. It is possible to launch the attack on the local host. The identifier of the patch is 60777d535b719631680bcf5d0969bdef79ca4eaf. It is recommended to apply a patch to fix this issue.
In HKUDS LightRAG bis 1.3.8 wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es die Funktion upload_to_input_dir der Datei lightrag/api/routers/document_routes.py der Komponente File Upload. Mittels Manipulieren des Arguments file.filename mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Patch wird als 60777d535b719631680bcf5d0969bdef79ca4eaf bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.
2025-06-27: | Advisory disclosed |
2025-06-27: | VulDB entry created |
2025-06-27: | VulDB entry last update |
Hannibal0x (VulDB User)
vuldb.com/?id.314089 (VDB-314089 | HKUDS LightRAG File Upload document_routes.py upload_to_input_dir path traversal)
vuldb.com/?ctiid.314089 (VDB-314089 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.601276 (Submit #601276 | HKUDS LightRAG v1.3.8 Path Traversal)
github.com/HKUDS/LightRAG/issues/1692
github.com/HKUDS/LightRAG/issues/1692
github.com/...ommit/60777d535b719631680bcf5d0969bdef79ca4eaf
Support options