Description
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
Published: 2024-06-27
Score: 7.5 High
EPSS: 62.7% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.09011}

epss

{'score': 0.3087}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika

Subscriptions

Stitionai Devika
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:11:12.417Z

Reserved: 2024-05-24T18:28:26.661Z

Link: CVE-2024-5334

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.417Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T18:15:20.223

Modified: 2025-07-15T15:37:39.700

Link: CVE-2024-5334

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:01:20Z

Weaknesses