Cyber Posture

CVE-2024-10901

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
17 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0154 81.5th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-10901 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Dbgpt Db-Gpt. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 18.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Data-Related Vulnerabilities risk domain.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations on the web API endpoint to prevent unauthenticated execution of arbitrary SQL queries.

prevent

Validates and sanitizes inputs to the API to block arbitrary SQL queries that enable file writes and RCE.

prevent

Restricts database privileges to minimal necessary access, mitigating file write capabilities from executed SQL.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Unauthenticated web API allows arbitrary SQL execution (T1190: Exploit Public-Facing Application), enabling database data collection (T1213.006: Databases) and arbitrary file writes to site-packages for Python RCE (T1059.006: Python).

NVD Description

In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's…

more

file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory.

Deeper analysisAI

CVE-2024-10901 is a critical vulnerability in eosphoros-ai/db-gpt version v0.6.0, where the web API endpoint `POST /api/v1/editor/chart/run` permits execution of arbitrary SQL queries without any access control. This flaw enables attackers to perform arbitrary file writes on the victim's file system. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).

Unauthenticated attackers with network access can exploit this vulnerability by sending crafted requests to the affected API endpoint, leading to arbitrary SQL execution. This allows them to write malicious files anywhere on the file system, potentially achieving remote code execution (RCE). For instance, attackers could write a malicious `__init__.py` file into Python's `/site-packages/` directory to execute arbitrary code.

The primary advisory is available at https://huntr.com/bounties/db2c1d59-6e3a-4553-a1f6-94c8df162a18, which details the vulnerability discovered through a bug bounty program. Security practitioners should consult this reference for specific mitigation guidance, such as upgrading to a patched version of db-gpt or implementing access controls on the API endpoint.

Details

CWE(s)

Affected Products

dbgpt
db-gpt
0.6.0

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Data-Related Vulnerabilities
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
DB-GPT (eosphoros-ai/db-gpt) is an open-source platform for building enterprise AI-native applications and private AI assistants powered by LLMs for database interactions, fitting the Enterprise AI Assistants category. The vulnerability is in its web API, confirmed AI-related via AI/ML bug bounty platform.

CVEs Like This One

CVE-2024-10835Same product: Dbgpt Db-Gpt
CVE-2024-10902Same product: Dbgpt Db-Gpt
CVE-2024-10906Same product: Dbgpt Db-Gpt
CVE-2025-7847Shared CWE-434
CVE-2024-13882Shared CWE-434
CVE-2025-26319Shared CWE-434
CVE-2024-9920Shared CWE-434
CVE-2025-26411Shared CWE-434
CVE-2025-34299Shared CWE-434
CVE-2025-15158Shared CWE-434

References