VYPR
High severityNVD Advisory· Published Nov 7, 2025· Updated Nov 12, 2025

CVE-2025-57698

CVE-2025-57698

Description

AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function file.save, so that the file in the request body can be saved to any location in the file system through directory traversal.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

AstrBot v3.5.22 suffers from a directory traversal vulnerability in the plugin upload endpoint, allowing arbitrary file write via a crafted filename.

Vulnerability

CVE-2025-57698 is a directory traversal flaw in AstrBot Project version 3.5.22. The handler function install_plugin_upload of the interface /plugin/install-upload parses the filename from the request body provided by the user and directly uses it to construct the file path without validation. The variable file_path is then passed to the file.save function, enabling an attacker to write files to arbitrary locations on the file system [1][2][3].

To exploit this vulnerability, an attacker must be able to send HTTP requests to the /plugin/install-upload endpoint. No authentication is mentioned as a prerequisite, meaning any unauthenticated user with network access to the AstrBot instance could potentially exploit it. The attack vector involves crafting a malicious filename containing path traversal sequences (e.g., ../) in the request body, which the server then uses to save the uploaded file content to write to an attacker-controlled path [3].

The impact of successful exploitation is arbitrary file write. An attacker could overwrite critical system files, inject malicious code (such as a web shell), or modify application configuration, potentially leading to remote code execution or complete compromise of the AstrBot server [3].

As of the publication date (2025-11-07), the vendor has not released a patch. Users are advised to restrict network access to the vulnerable endpoint, implement input validation for filenames, or upgrade to a patched version once available [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
AstrBotPyPI
<= 3.5.22

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.