Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2494 | Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request |
Github GHSA |
GHSA-4mrc-w7jh-hx4j | Mage AI Path Traversal vulnerability |
Fri, 10 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mage:mage-ai:-:*:*:*:*:python:*:* |
Fri, 23 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mage
Mage mage-ai |
|
| Weaknesses | CWE-35 | |
| CPEs | cpe:2.3:a:mage:mage-ai:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Mage
Mage mage-ai |
|
| Metrics |
ssvc
|
Fri, 23 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request | |
| Title | Mage AI pipeline interaction request remote arbitrary file leak | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-11-25T12:34:23.043Z
Reserved: 2024-08-22T07:56:35.556Z
Link: CVE-2024-45190
Updated: 2024-08-23T19:38:45.907Z
Status : Analyzed
Published: 2024-08-23T20:15:08.403
Modified: 2025-10-10T19:57:48.303
Link: CVE-2024-45190
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA