CVE-2025-57698
Description
AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function file.save, so that the file in the request body can be saved to any location in the file system through directory traversal.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
AstrBot v3.5.22 suffers from a directory traversal vulnerability in the plugin upload endpoint, allowing arbitrary file write via a crafted filename.
Vulnerability
CVE-2025-57698 is a directory traversal flaw in AstrBot Project version 3.5.22. The handler function install_plugin_upload of the interface /plugin/install-upload parses the filename from the request body provided by the user and directly uses it to construct the file path without validation. The variable file_path is then passed to the file.save function, enabling an attacker to write files to arbitrary locations on the file system [1][2][3].
To exploit this vulnerability, an attacker must be able to send HTTP requests to the /plugin/install-upload endpoint. No authentication is mentioned as a prerequisite, meaning any unauthenticated user with network access to the AstrBot instance could potentially exploit it. The attack vector involves crafting a malicious filename containing path traversal sequences (e.g., ../) in the request body, which the server then uses to save the uploaded file content to write to an attacker-controlled path [3].
The impact of successful exploitation is arbitrary file write. An attacker could overwrite critical system files, inject malicious code (such as a web shell), or modify application configuration, potentially leading to remote code execution or complete compromise of the AstrBot server [3].
As of the publication date (2025-11-07), the vendor has not released a patch. Users are advised to restrict network access to the vulnerable endpoint, implement input validation for filenames, or upgrade to a patched version once available [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
AstrBotPyPI | <= 3.5.22 | — |
Affected products
2- AstrBot Project/AstrBot Projectdescription
- Range: = v3.5.22
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.