Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vm2f-46xc-5jc3 | AstrBot has an arbitrary file read vulnerability in function _encode_image_bs64 |
Fri, 05 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:astrbot:astrbot:3.5.22:*:*:*:*:*:*:* |
Wed, 12 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
cvssV3_1
|
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Astrbot
Astrbot astrbot |
|
| Vendors & Products |
Astrbot
Astrbot astrbot |
Fri, 07 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AstrBot Project v3.5.22 has an arbitrary file read vulnerability in function _encode_image_bs64. Since the _encode_image_bs64 function defined in entities.py opens the image specified by the user in the request body and returns the image content as a base64-encoded string without checking the legitimacy of the image path, attackers can construct a series of malicious URLs to read any specified file, resulting in sensitive data leakage. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-12T17:14:18.490Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57697
Updated: 2025-11-12T17:14:13.263Z
Status : Analyzed
Published: 2025-11-07T18:15:36.200
Modified: 2025-12-05T20:42:56.480
Link: CVE-2025-57697
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:34:27Z
Github GHSA