Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47055 | A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition. |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stitionai
Stitionai devika |
|
| CPEs | cpe:2.3:a:stitionai:devika:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Stitionai
Stitionai devika |
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:25:03.166Z
Reserved: 2024-06-12T19:35:01.373Z
Link: CVE-2024-5926
Updated: 2024-08-01T21:25:03.166Z
Status : Analyzed
Published: 2024-06-30T01:15:09.707
Modified: 2025-07-10T22:32:39.373
Link: CVE-2024-5926
No data.
OpenCVE Enrichment
No data.
EUVD