CVE-2026-27483
Published: 24 February 2026
Description
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. The vulnerability exists in…
more
the "Upload File" module, which corresponds to the API endpoint /api/files. Since the multipart file upload does not perform security checks on the uploaded file path, an attacker can perform path traversal by using `../` sequences in the filename field. The file write operation occurs before calling clear_filename and save_file, meaning there is no filtering of filenames or file types, allowing arbitrary content to be written to any path on the server. Version 25.9.1.1 patches the issue.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of file paths in the upload endpoint to reject path traversal sequences like '../', preventing arbitrary file writes on the server.
Enforces access control policies to restrict file write operations to only authorized server paths, blocking exploitation of the unfiltered multipart upload.
Monitors for unauthorized changes to software, firmware, or files that result from path traversal overwrites, enabling detection of exploitation attempts.
Security SummaryAI
CVE-2026-27483 is a path traversal vulnerability (CWE-22) in MindsDB, an open-source platform for building artificial intelligence applications from enterprise data. The flaw affects versions prior to 25.9.1.1 and exists in the /api/files endpoint, specifically the "Upload File" module. Multipart file uploads fail to perform security checks on the uploaded file path, allowing attackers to use ../ sequences in the filename field. File write operations occur before clear_filename and save_file functions are called, enabling unfiltered writes of arbitrary content to server paths. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An authenticated attacker with low privileges can exploit this issue remotely over the network with no user interaction required. By crafting a malicious file upload request with path traversal in the filename, the attacker can overwrite or create files in arbitrary locations on the server filesystem, such as executable scripts or configuration files. This capability leads to remote command execution, granting high-impact confidentiality, integrity, and availability compromises.
MindsDB patches the vulnerability in version 25.9.1.1, which security practitioners should apply immediately to affected deployments. Official mitigation details are documented in the GitHub security advisory (GHSA-4894-xqv6-vrfq), the release notes for v25.9.1.1, and the fixing commit (87a44bdb2b97f963e18f10a068e1a1e2690505ef).
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: artificial intelligence
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The path traversal vulnerability in the file upload endpoint allows low-privileged authenticated attackers to write arbitrary files remotely, enabling remote code execution through overwriting executable scripts or configuration files, directly facilitating exploitation for privilege escalation.