Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vmwq-8g8c-jm79 | OpenChatBI has a Path Traversal Vulnerability in save_report Tool |
Tue, 10 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zhongyu09:openchatbi:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zhongyu09
Zhongyu09 openchatbi |
|
| Vendors & Products |
Zhongyu09
Zhongyu09 openchatbi |
Fri, 06 Mar 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenChatBI is an intelligent chat-based BI tool powered by large language models, designed to help users query, analyze, and visualize data through natural language conversations. Prior to version 0.2.2, the save_report tool in openchatbi/tool/save_report.py suffers from a critical path traversal vulnerability due to insufficient input sanitization of the file_format parameter. This issue has been patched in version 0.2.2. | |
| Title | OpenChatBI: Critical Path Traversal Vulnerability in save_report Tool of OpenChatBI | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T19:52:48.920Z
Reserved: 2026-03-03T14:25:19.245Z
Link: CVE-2026-28795
Updated: 2026-03-09T19:52:44.532Z
Status : Analyzed
Published: 2026-03-06T07:16:00.293
Modified: 2026-03-10T19:45:25.920
Link: CVE-2026-28795
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:45:26Z
Github GHSA