kotaemon is an open-source RAG-based tool for document comprehension. From versions 0.10.6 and prior, in libs/ktem/ktem/index/file/ui.py, the index_fn method accepts both URLs and local file paths without validation. The pipeline streams these paths directly and stores them, enabling attackers to traverse directories (e.g. ../../../../../.env) and exfiltrate sensitive files. This issue has been patched via commit 37cdc28, in version 0.10.7 which has not been made public at time of publication.
References
Configurations
No configuration.
History
03 Jul 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-02 16:15
Updated : 2025-07-03 15:13
NVD link : CVE-2025-53358
Mitre link : CVE-2025-53358
CVE.ORG link : CVE-2025-53358
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')