MindsDB has improper sanitation of filepath that leads to information disclosure and DOS
Description
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
MindsDBPyPI | < 25.11.1 | 25.11.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-qqhf-pm3j-96g7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-68472ghsaADVISORY
- github.com/mindsdb/mindsdb/releases/tag/v25.11.1ghsaWEB
- github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7ghsax_refsource_CONFIRMWEB
- www.bluerock.io/post/cve-2025-68472-mindsdb-file-upload-path-traversalghsaWEB
News mentions
0No linked articles in our index yet.