CVE-2025-68472

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*

History

27 Jan 2026, 20:45

Type Values Removed Values Added
CPE cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*
References () https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7 - () https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7 - Exploit, Vendor Advisory
First Time Mindsdb mindsdb
Mindsdb

12 Jan 2026, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-12 17:15

Updated : 2026-01-27 20:45


NVD link : CVE-2025-68472

Mitre link : CVE-2025-68472

CVE.ORG link : CVE-2025-68472


JSON object : View

Products Affected

mindsdb

  • mindsdb
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal

CWE-36

Absolute Path Traversal