CVE-2025-68472
Published: 12 January 2026
Description
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage,…
more
exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the unauthenticated path traversal by requiring validation of user-controlled data in JSON file upload requests before joining into filesystem paths.
Enforces logical access controls to prevent the file upload handler from reading or moving arbitrary files outside intended storage directories.
Requires timely remediation of the specific flaw in file.py via patching to version 25.11.1 or later, preventing exploitation and restoring secure operation.
Security SummaryAI
CVE-2025-68472 is an unauthenticated path traversal vulnerability in MindsDB, a platform for building artificial intelligence from enterprise data, affecting versions prior to 25.11.1. The flaw exists in the file upload API's PUT handler in file.py, which directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Multipart uploads and URL-sourced uploads receive sanitization via clear_filename or equivalent checks, but JSON uploads lack these protections, enabling attackers to read arbitrary files from the server filesystem and move them into MindsDB’s storage.
The vulnerability can be exploited by unauthenticated attackers with adjacent network access (AV:A), requiring low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). Successful exploitation allows reading arbitrary files and relocating them into MindsDB storage, exposing sensitive data. It carries a CVSS v3.1 base score of 8.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) and is associated with CWEs 22, 23, and 36.
MindsDB addressed the issue in version 25.11.1. Security practitioners should upgrade to this version or later. Additional mitigation details are available in the GitHub security advisory at https://github.com/mindsdb/mindsdb/security/advisories/GHSA-qqhf-pm3j-96g7 and the BlueRock analysis at https://www.bluerock.io/post/cve-2025-68472-mindsdb-file-upload-path-traversal.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: artificial intelligence
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability in unauthenticated file upload API of public-facing application enables exploitation of public-facing app (T1190) and arbitrary file reads from local filesystem (T1005).