{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T21:31:27.290","vulnerabilities":[{"cve":{"id":"CVE-2025-51459","sourceIdentifier":"cve@mitre.org","published":"2025-07-22T19:15:25.133","lastModified":"2025-09-11T16:13:25.900","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"File Upload vulnerability in agent.hub.controller.refresh_plugins in eosphoros-ai DB-GPT 0.7.0 allows remote attackers to execute arbitrary code via a malicious plugin ZIP file uploaded to the /v1/personal/agent/upload endpoint, interacting with plugin_hub._sanitize_filename and plugins_util.scan_plugins."},{"lang":"es","value":"La vulnerabilidad de carga de archivos en agent.hub.controller.refresh_plugins en eosphoros-ai DB-GPT 0.7.0 permite a atacantes remotos ejecutar código arbitrario a través de un archivo ZIP de complemento malicioso cargado en el endpoint /v1/personal/agent/upload, interactuando con plugin_hub._sanitize_filename y plugins_util.scan_plugins."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dbgpt:db-gpt:0.7.0:*:*:*:*:*:*:*","matchCriteriaId":"0BCF7AF3-BD77-4457-BEE7-9FF5DE4F7F1E"}]}]}],"references":[{"url":"https://github.com/eosphoros-ai/DB-GPT/pull/2649","source":"cve@mitre.org","tags":["Exploit","Issue Tracking"]},{"url":"https://www.gecko.security/blog/cve-2025-51459","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}