Platform
python
Component
mindsdb
Fixed in
25.11.2
25.11.1
CVE-2025-68472 describes a Path Traversal vulnerability affecting MindsDB, a platform for building AI from enterprise data. This flaw allows unauthenticated attackers to read sensitive files from the server's filesystem and potentially move them into MindsDB's storage. The vulnerability impacts versions of MindsDB up to and including 25.9.3rc1, and a fix is available in version 25.11.1.
The primary impact of this vulnerability is the potential for unauthorized access to sensitive data stored on the server. An attacker can exploit this flaw to read configuration files, database credentials, or other confidential information. Furthermore, the ability to move files into MindsDB’s storage could allow an attacker to overwrite existing data or introduce malicious files, potentially leading to data corruption or further compromise of the system. This vulnerability resembles other path traversal exploits where attackers leverage predictable file system structures to bypass access controls.
This vulnerability was publicly disclosed on 2026-01-12. No public proof-of-concept (POC) code has been released at the time of writing. The vulnerability is not currently listed on CISA KEV. The CVSS score of 8.1 (HIGH) indicates a significant risk, suggesting a moderate probability of exploitation if the vulnerability remains unpatched.
Exploit Status
EPSS
0.45% (64% percentile)
CISA SSVC
CVSS Vector
The recommended mitigation is to immediately upgrade MindsDB to version 25.11.1 or later, which includes the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting network access to the file upload API or implementing stricter input validation to prevent malicious path manipulation. Review and audit file upload processes to ensure proper sanitization of user-supplied data. After upgrading, confirm the fix by attempting a path traversal attack via the file upload API and verifying that access is denied.
Update MindsDB to version 25.11.1 or higher. This version fixes the path traversal vulnerability in the file upload API, preventing the reading of arbitrary files and the exposure of sensitive data.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-68472 is a Path Traversal vulnerability in MindsDB versions up to 25.9.3rc1, allowing unauthenticated attackers to read sensitive files.
You are affected if you are running MindsDB version 25.9.3rc1 or earlier. Upgrade to 25.11.1 to resolve the issue.
Upgrade MindsDB to version 25.11.1 or later. As a temporary workaround, restrict network access to the file upload API.
There is no confirmed active exploitation of CVE-2025-68472 at this time, but the HIGH severity score warrants immediate attention.
Refer to the official MindsDB security advisory for detailed information and updates regarding CVE-2025-68472.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.