Cyber Posture

CVE-2024-8958

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0127 79.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2024-8958 is an unrestricted file write and read vulnerability in the filetools actions of composiohq/composio version 0.4.3. The issue stems from improper validation of file paths, enabling attackers to access and modify files anywhere on the server. Published on 2025-03-20, it is associated with CWE-434 and carries a CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to high impacts on confidentiality, integrity, and availability.

Remote unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By manipulating file paths in filetools actions, they can read sensitive files or write arbitrary content, potentially achieving privilege escalation or remote code execution on the affected server.

Mitigation details are available in the advisory published on Huntr at https://huntr.com/bounties/e152b094-0593-428e-b813-068d2390ce68. Security practitioners should review this reference for patch information and remediation steps specific to composio version 0.4.3.

Details

CWE(s)
CWE-434

Affected Products

composio
composio
0.4.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The vulnerability is a remote unauthenticated path traversal flaw in a public-facing application enabling arbitrary file read/write, directly mapping to T1190 for initial access and facilitating T1005 for collecting data from the local system.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References