提交 #779148: PromtEngineer localGPT Latest (commit: 4d41c7d) Arbitrary File Read信息

标题PromtEngineer localGPT Latest (commit: 4d41c7d) Arbitrary File Read
描述A critical vulnerability chain exists in localGPT's RAG (Retrieval-Augmented Generation) system that allows any unauthenticated attacker to read arbitrary files from the server and extract their complete contents through the web interface. The vulnerability combines two separate flaws: By chaining these vulnerabilities, an attacker can: Read sensitive configuration files containing passwords, API keys, and database credentials Extract user data and system information Access AWS credentials, SSH keys, and other secrets Perform all actions without any authentication This is a zero-click, pre-authentication remote code execution equivalent that leads to complete system compromise.
来源⚠️ https://github.com/August829/CVEP/issues/10
用户
 Yu_Bao (UID 89348)
提交2026-03-13 03時53分 (21 日前)
管理2026-03-27 14時49分 (14 days later)
状态已接受
VulDB条目353890 [PromtEngineer localGPT 直到 4d41c7d1713b16b216d8e062e51a5dd88b20b054 Web Interface rag_system/api_server.py handle_index 信息公开]
积分20

Want to know what is going to be exploited?

We predict KEV entries!