Relative Path Traversal Affecting astrbot package, versions [,3.5.13)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.07% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Relative Path Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-ASTRBOT-10295647
  • published3 Jun 2025
  • disclosed2 Jun 2025
  • credit360 VRI

Introduced: 2 Jun 2025

NewCVE-2025-48957  (opens in a new tab)
CWE-23  (opens in a new tab)

How to fix?

Upgrade AstrBot to version 3.5.13 or higher.

Overview

AstrBot is a 易上手的多平台 LLM 聊天机器人及开发框架

Affected versions of this package are vulnerable to Relative Path Traversal through the /api/chat/get_file endpoint. An attacker can access sensitive information such as API keys and account passwords by manipulating the file path input to traverse to restricted directories.

Workaround

This vulnerability can be mitigated by editing the cmd_config.json file to disable the dashboard feature as a temporary measure.

CVSS Base Scores

version 4.0
version 3.1