| Title | PromtEngineer localGPT Latest (commit: 4d41c7d) Arbitrary File Read |
|---|
| Description | A critical vulnerability chain exists in localGPT's RAG (Retrieval-Augmented Generation) system that allows any unauthenticated attacker to read arbitrary files from the server and extract their complete contents through the web interface. The vulnerability combines two separate flaws:
By chaining these vulnerabilities, an attacker can:
Read sensitive configuration files containing passwords, API keys, and database credentials
Extract user data and system information
Access AWS credentials, SSH keys, and other secrets
Perform all actions without any authentication
This is a zero-click, pre-authentication remote code execution equivalent that leads to complete system compromise. |
|---|
| Source | ⚠️ https://github.com/August829/CVEP/issues/10 |
|---|
| User | Yu_Bao (UID 89348) |
|---|
| Submission | 03/13/2026 03:53 (16 days ago) |
|---|
| Moderation | 03/27/2026 14:49 (14 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 353890 [PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054 Web Interface rag_system/api_server.py handle_index information disclosure] |
|---|
| Points | 20 |
|---|