Path Traversal Vulnerability in xlang-ai OpenAgents
CVE-2025-6282

5.1MEDIUM

Key Information:

Vendor

Xlang-ai

Vendor
CVE Published:
19 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-6282?

A path traversal vulnerability exists in the create_upload_file function of xlang-ai OpenAgents. This flaw allows attackers to manipulate file paths, potentially leading to unauthorized file access and data exposure. The vulnerability affects specific versions of OpenAgents up to a particular commit and has been made public, heightening the risk of exploitation. While continuous delivery practices complicate version tracking for updates, users should remain vigilant for potential risks associated with this vulnerability.

Affected Version(s)

OpenAgents ff2e46440699af1324eb25655b622c4a131265bb

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-6282 : Path Traversal Vulnerability in xlang-ai OpenAgents