Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request
                
            References
                    | Link | Resource | 
|---|---|
| https://research.jfrog.com/vulnerabilities/mage-ai-pipeline-interaction-request-remote-arbitrary-file-leak-jfsa-2024-001039605/ | Exploit Third Party Advisory | 
Configurations
                    History
                    10 Oct 2025, 19:57
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Mage
         Mage mage-ai  | 
|
| CPE | cpe:2.3:a:mage:mage-ai:-:*:*:*:*:python:*:* | |
| References | () https://research.jfrog.com/vulnerabilities/mage-ai-pipeline-interaction-request-remote-arbitrary-file-leak-jfsa-2024-001039605/ - Exploit, Third Party Advisory | 
26 Aug 2024, 12:47
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
23 Aug 2024, 20:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-35 | 
23 Aug 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-23 20:15
Updated : 2025-10-10 19:57
NVD link : CVE-2024-45190
Mitre link : CVE-2024-45190
CVE.ORG link : CVE-2024-45190
JSON object : View
Products Affected
                mage
- mage-ai
 
CWE
                
                    
                        
                        CWE-35
                        
            Path Traversal: '.../...//'
