MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1.
References
| Link | Resource |
|---|---|
| https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7 | Exploit Vendor Advisory |
Configurations
History
27 Jan 2026, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:* | |
| References | () https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7 - Exploit, Vendor Advisory | |
| First Time |
Mindsdb mindsdb
Mindsdb |
12 Jan 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-12 17:15
Updated : 2026-01-27 20:45
NVD link : CVE-2025-68472
Mitre link : CVE-2025-68472
CVE.ORG link : CVE-2025-68472
JSON object : View
Products Affected
mindsdb
- mindsdb
