Stitionai

Devika

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.05%
  • Veröffentlicht 20.03.2025 10:11:17
  • Zuletzt bearbeitet 20.03.2025 10:15:32

A path traversal vulnerability exists in stitionai/devika, specifically in the project creation functionality. In the affected version beacf6edaa205a5a5370525407a6db45137873b3, the project name is not validated, allowing an attacker to create a proje...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 14.08.2024 14:15:28
  • Zuletzt bearbeitet 25.03.2025 17:16:13

A stored cross site scripting vulnerabilities exists in DevikaAI from commit 6acce21fb08c3d1123ef05df6a33912bf0ee77c2 onwards via improperly decoded user input.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 04.08.2024 00:15:47
  • Zuletzt bearbeitet 30.08.2024 16:15:10

stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with `HarmBlockThreshold.BLOCK_NONE` for `HarmCategory.HARM_CATEGO...

Exploit
  • EPSS 92.9%
  • Veröffentlicht 24.07.2024 16:15:07
  • Zuletzt bearbeitet 29.01.2025 22:15:29

The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the s...

  • EPSS 0.41%
  • Veröffentlicht 10.07.2024 01:15:10
  • Zuletzt bearbeitet 21.11.2024 09:49:38

The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a mal...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 09.07.2024 00:15:02
  • Zuletzt bearbeitet 15.07.2025 13:23:08

A CORS misconfiguration in the stitionai/devika repository allows attackers to steal sensitive information such as logs, browser sessions, and settings containing private API keys from other services. This vulnerability also enables attackers to perf...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 08.07.2024 00:15:01
  • Zuletzt bearbeitet 21.11.2024 09:48:13

A stored Cross-Site Scripting (XSS) vulnerability exists in the stitionai/devika chat feature, allowing attackers to inject malicious payloads into the chat input. This vulnerability is due to the lack of input validation and sanitization on both the...

  • EPSS 0.09%
  • Veröffentlicht 03.07.2024 18:15:05
  • Zuletzt bearbeitet 15.10.2025 13:15:47

The vulnerability allows an attacker to access sensitive files on the server by confusing the agent with incorrect file names. When a user requests the content of a file with a misspelled name, the agent attempts to correct the command and inadverten...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 30.06.2024 01:15:09
  • Zuletzt bearbeitet 10.07.2025 22:32:39

A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The ...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 28.06.2024 20:15:02
  • Zuletzt bearbeitet 15.07.2025 13:25:12

A Cross-Site Request Forgery (CSRF) vulnerability was identified in the stitionai/devika application, affecting the latest version. This vulnerability allows attackers to perform unauthorized actions in the context of a victim's browser, such as dele...