Cyber Posture

CVE-2024-10902

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0180 82.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-10902 is a critical-severity Path Traversal (CWE-22) vulnerability in Dbgpt Db-Gpt. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other Platforms.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs like file paths and names to block path traversal and arbitrary file writes exploited in this CVE.

prevent

Applies least privilege to the web application process, preventing malicious file writes to sensitive locations like Python site-packages even if upload succeeds.

prevent

Restricts classes of inputs to limit file uploads to authorized types and safe paths, mitigating arbitrary upload risks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

The CVE describes an arbitrary file upload vulnerability with path traversal in a public-facing web API, directly enabling exploitation of public-facing applications (T1190) and allowing upload of malicious Python code (e.g., __init__.py to site-packages) for RCE via the Python interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any location. The impact of this vulnerability…

more

includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory.

Deeper analysisAI

CVE-2024-10902, published on 2025-03-20, is an Arbitrary File Upload vulnerability with Path Traversal in eosphoros-ai/db-gpt version v0.6.0. The affected component is the web API endpoint `POST /v1/personal/agent/upload`, which fails to properly validate file paths, enabling attackers to write arbitrary files to any location on the victim's file system.

The vulnerability has a CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-22. Unauthorized remote attackers can exploit it with low complexity, no privileges, and no user interaction required. Exploitation allows uploading malicious files anywhere, potentially leading to remote code execution (RCE), such as by writing a malicious `__init__.py` file to Python's `/site-packages/` directory.

Mitigation details are available in the Huntr advisory at https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f.

Details

CWE(s)

Affected Products

dbgpt
db-gpt
0.6.0

AI Security AnalysisAI

AI Category
Other Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Regex match

CVEs Like This One

CVE-2024-10901Same product: Dbgpt Db-Gpt
CVE-2024-10906Same product: Dbgpt Db-Gpt
CVE-2024-10835Same product: Dbgpt Db-Gpt
CVE-2025-27782Shared CWE-22
CVE-2026-35050Shared CWE-22
CVE-2025-10488Shared CWE-22
CVE-2025-27783Shared CWE-22
CVE-2025-2294Shared CWE-22
CVE-2025-50857Shared CWE-22
CVE-2025-59384Shared CWE-22

References