Cross-site Request Forgery (CSRF) Affecting dbgpt package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-DBGPT-9586747
  • published1 Apr 2025
  • disclosed20 Mar 2025
  • creditpatrik-ha

Introduced: 20 Mar 2025

NewCVE-2024-10906  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

There is no fixed version for dbgpt.

Overview

dbgpt is a DB-GPT is an experimental open-source project that uses localized GPT large models to interact with your data and environment. With this solution, you can beassured that there is no risk of data leakage, and your data is 100% private and secure.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to the overly permissive configuration of CORSMiddleware which sets the Access-Control-Allow-Origin to *. An attacker can interact with any endpoints of the instance, potentially leading to unauthorized actions being performed on behalf of the user.

References

CVSS Base Scores

version 4.0
version 3.1