We use cookies to improve your experience on our site.
AVID-2026-R1618
Description
Path Traversal in modelscope/agentscope (CVE-2024-8438)
Details
A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint /api/file does not properly sanitize the path parameter, allowing an attacker to read arbitrary files on the server.
Reason for inclusion in AVID: CVE-2024-8438 describes a path traversal vulnerability in modelscope/agentscope, an AI model tooling/component. It affects software used to build/deploy AI systems (AI frameworks/pipelines). It enables reading arbitrary server files, a security/safety vulnerability (data exposure). The report provides explicit CVE details, affected component, and impact, supporting AI-related supply-chain relevance.
References
Affected or Relevant Artifacts
- Developer: modelscope
- Deployer: modelscope
- Artifact Details:
| Type | Name |
|---|---|
| System | modelscope/agentscope |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Base Score | 7.5 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | NONE |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-22 | CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry