Cyber Posture

CVE-2024-8769

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0131 79.9th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-8769 is a critical-severity Path Traversal (CWE-22) vulnerability in Aimstack Aim. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 20.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates and sanitizes the user-controlled run_hash parameter to block relative path traversal attempts in LockManager.release_locks.

prevent

Remediates the specific path traversal flaw in aimhubio/aim's LockManager.release_locks by applying vendor patches or code fixes promptly.

prevent

Enforces least privilege on the tracking server process to restrict file system access, limiting the impact of arbitrary deletions even if traversal succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

Remote unauthenticated path traversal in public-facing tracking server API directly enables exploitation via T1190 (Exploit Public-Facing Application) and facilitates arbitrary file deletion mapped to T1485 (Data Destruction).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This…

more

vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

Deeper analysisAI

CVE-2024-8769 is a path traversal vulnerability in the `LockManager.release_locks` function within aimhubio/aim at commit bb76afe, enabling arbitrary file deletion. The user-controlled `run_hash` parameter is concatenated without normalization into a path used for file deletion operations. This flaw is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API.

Attackers can exploit this vulnerability remotely over the network with no authentication or user interaction required, as indicated by its CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) and association with CWE-22. By crafting a malicious `run_hash` value in a request to the tracking server's instruction API, an unauthenticated attacker can delete any arbitrary file on the machine hosting the server.

Mitigation details and additional technical analysis are available in the Huntr advisory at https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7.

Details

CWE(s)

Affected Products

aimstack
aim
≤ 3.24.0

CVEs Like This One

CVE-2025-51464Same product: Aimstack Aim
CVE-2024-7760Same product: Aimstack Aim
CVE-2024-8238Same product: Aimstack Aim
CVE-2025-0189Same product: Aimstack Aim
CVE-2025-0190Same product: Aimstack Aim
CVE-2025-14868Shared CWE-22
CVE-2026-33293Shared CWE-22
CVE-2024-8898Shared CWE-22
CVE-2025-69376Shared CWE-22
CVE-2025-69097Shared CWE-22

References