{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:18:28.558","vulnerabilities":[{"cve":{"id":"CVE-2024-10901","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:20.997","lastModified":"2025-07-17T13:40:42.147","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory."},{"lang":"es","value":"En la versión v0.6.0 de eosphoros-ai/db-gpt, la API web `POST /api/v1/editor/chart/run` permite la ejecución de consultas SQL arbitrarias sin control de acceso. Esta vulnerabilidad puede ser explotada por atacantes para realizar escrituras arbitrarias de archivos, lo que les permite escribir archivos arbitrarios en el sistema de archivos de la víctima. Esto puede provocar la ejecución remota de código (RCE) mediante la escritura de archivos maliciosos como `__init__.py` en el directorio `/site-packages/` de Python."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:*","matchCriteriaId":"EBDB9D41-53F0-4893-AD12-C627705D4615"}]}]}],"references":[{"url":"https://huntr.com/bounties/db2c1d59-6e3a-4553-a1f6-94c8df162a18","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}