| Titre | PromtEngineer localGPT Latest (commit: 4d41c7d) Arbitrary File Read |
|---|
| Description | A critical vulnerability chain exists in localGPT's RAG (Retrieval-Augmented Generation) system that allows any unauthenticated attacker to read arbitrary files from the server and extract their complete contents through the web interface. The vulnerability combines two separate flaws:
By chaining these vulnerabilities, an attacker can:
Read sensitive configuration files containing passwords, API keys, and database credentials
Extract user data and system information
Access AWS credentials, SSH keys, and other secrets
Perform all actions without any authentication
This is a zero-click, pre-authentication remote code execution equivalent that leads to complete system compromise. |
|---|
| La source | ⚠️ https://github.com/August829/CVEP/issues/10 |
|---|
| Utilisateur | Yu_Bao (UID 89348) |
|---|
| Soumission | 13/03/2026 03:53 (il y a 22 jours) |
|---|
| Modérer | 27/03/2026 14:49 (14 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 353890 [PromtEngineer localGPT Web Interface rag_system/api_server.py handle_index divulgation d'information] |
|---|
| Points | 20 |
|---|