CVE-2025-0452

8.2 HIGH

📋 TL;DR

DB-GPT versions on Windows systems are vulnerable to arbitrary file deletion through the '/v1/agent/hub/update' endpoint. Attackers can manipulate the 'plugin_repo_name' variable to delete any files on the host system due to improper filtering of backslash characters. This affects all Windows deployments of DB-GPT using the latest version.

💻 Affected Systems

Products:
  • eosphoros-ai/DB-GPT
Versions: latest version (specific version numbers not provided in CVE)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems due to backslash path separator. Linux/macOS systems are not vulnerable to this specific attack vector.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to OS corruption, data loss, and potential ransomware deployment.

🟠

Likely Case

Selective deletion of application files, configuration files, or user data causing service disruption and data loss.

🟢

If Mitigated

Limited to application directory if proper file permissions and sandboxing are implemented.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via API and can be exploited remotely if exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires knowledge of the API endpoint and ability to craft malicious requests with path traversal using backslashes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://huntr.com/bounties/7e854343-3d61-47d4-ad41-c4d2f356a54a

Restart Required: No

Instructions:

1. Check the vendor advisory for patched version. 2. Update DB-GPT to the latest patched version. 3. Validate that the '/v1/agent/hub/update' endpoint properly sanitizes input.

🔧 Temporary Workarounds

Input Validation Filter

Windows

Add server-side validation to reject requests containing backslash characters in the plugin_repo_name parameter.

Implement input sanitization: if '\\' in plugin_repo_name: reject_request()

Endpoint Restriction

all

Restrict access to the vulnerable endpoint using network controls or authentication requirements.

Configure firewall rules to limit access to /v1/agent/hub/update endpoint

🧯 If You Can't Patch

  • Implement strict file system permissions to limit DB-GPT service account to only necessary directories
  • Deploy web application firewall (WAF) rules to block requests containing path traversal patterns with backslashes

🔍 How to Verify

Check if Vulnerable:

Test if sending a request to /v1/agent/hub/update with plugin_repo_name containing '..\\' triggers file operations outside intended directory.

Check Version:

Check DB-GPT version through application interface or configuration files

Verify Fix Applied:

Attempt the same test after patching - requests with backslashes should be rejected or properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • API requests to /v1/agent/hub/update with suspicious parameters containing backslashes

Network Indicators:

  • Multiple rapid requests to the vulnerable endpoint
  • Requests with unusual path patterns in plugin_repo_name parameter

SIEM Query:

source="web_logs" AND uri_path="/v1/agent/hub/update" AND (plugin_repo_name="*..\\*" OR plugin_repo_name="*\\*\\*")

🔗 References

📤 Share & Export