{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68472","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-18T13:52:15.491Z","datePublished":"2026-01-12T16:53:47.748Z","dateUpdated":"2026-02-20T16:17:22.733Z"},"containers":{"cna":{"title":"MindsDB has improper sanitation of filepath that leads to information disclosure and DOS","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-23","lang":"en","description":"CWE-23: Relative Path Traversal","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-36","lang":"en","description":"CWE-36: Absolute Path Traversal","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7"}],"affected":[{"vendor":"mindsdb","product":"mindsdb","versions":[{"version":"< 25.11.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-12T17:09:01.293Z"},"descriptions":[{"lang":"en","value":"MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not \"url\". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1."}],"source":{"advisory":"GHSA-qqhf-pm3j-96g7","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-12T18:36:34.460933Z","id":"CVE-2025-68472","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-12T18:36:45.793Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-02-20T16:17:22.733Z"},"references":[{"url":"https://www.bluerock.io/post/cve-2025-68472-mindsdb-file-upload-path-traversal"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}