Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11042: CWE-73 External Control of File Name or Path in invoke-ai invoke-ai/invokeai

0
Critical
VulnerabilityCVE-2024-11042cvecve-2024-11042cwe-73
Published: Thu Mar 20 2025 (03/20/2025, 10:08:52 UTC)
Source: CVE Database V5
Vendor/Project: invoke-ai
Product: invoke-ai/invokeai

Description

In invoke-ai/invokeai version v5.0.2, the web API `POST /api/v1/images/delete` is vulnerable to Arbitrary File Deletion. This vulnerability allows unauthorized attackers to delete arbitrary files on the server, potentially including critical or sensitive system files such as SSH keys, SQLite databases, and configuration files. This can impact the integrity and availability of applications relying on these files.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:20:35 UTC

Technical Analysis

CVE-2024-11042 is a critical security vulnerability classified under CWE-73 (External Control of File Name or Path) affecting the invoke-ai/invokeai project, specifically version 5.0.2. The vulnerability resides in the web API endpoint POST /api/v1/images/delete, which improperly handles user-supplied input for file deletion requests. Due to insufficient validation or sanitization of the file path parameter, an attacker can craft requests to delete arbitrary files on the server hosting the application. This can include critical system files such as SSH private keys, SQLite database files, and configuration files that are essential for application integrity and availability. The vulnerability is remotely exploitable without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.0 base score of 9.1 reflects the ease of exploitation (network vector, low complexity), no privileges required, and the high impact on integrity and availability. Although no public exploits have been reported yet, the potential for destructive impact is significant, especially in environments where invoke-ai/invokeai is used for AI image generation or related services. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for organizations to implement compensating controls. The vulnerability’s exploitation could lead to denial of service, data loss, or compromise of system security credentials, severely disrupting operations and trust in affected deployments.

Potential Impact

For European organizations, the impact of CVE-2024-11042 can be severe. Organizations using invoke-ai/invokeai in production or research environments risk unauthorized deletion of critical files, which can cause service outages, data corruption, or loss of sensitive credentials. This can disrupt AI-driven workflows, damage intellectual property, and compromise system security. The deletion of SSH keys or configuration files could allow attackers to escalate privileges or maintain persistence after initial exploitation. Given the vulnerability requires no authentication, attackers can launch automated attacks at scale, increasing the risk of widespread disruption. Industries relying on AI tools for innovation, such as technology firms, research institutions, and media companies, are particularly vulnerable. The loss of availability and integrity may also lead to regulatory compliance issues under GDPR if personal data or system logs are affected. Recovery efforts may require significant downtime and forensic investigation, increasing operational costs and reputational damage.

Mitigation Recommendations

1. Immediately restrict network access to the POST /api/v1/images/delete endpoint by implementing firewall rules or API gateway controls to allow only trusted internal users or systems. 2. Apply strict input validation and sanitization on file path parameters to ensure only authorized and expected files can be deleted, using allowlists or canonical path checks. 3. Implement role-based access control (RBAC) and authentication mechanisms to prevent unauthorized API usage. 4. Monitor file system integrity with tools that detect unexpected deletions or modifications, and alert administrators promptly. 5. Regularly back up critical files such as SSH keys, databases, and configuration files to enable rapid recovery. 6. Stay informed about official patches or updates from the invoke-ai project and apply them as soon as they become available. 7. Conduct security audits and penetration tests focusing on API endpoints to identify similar vulnerabilities. 8. Consider isolating the invoke-ai service in a container or sandbox environment with limited file system permissions to minimize potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-11-09T05:38:31.798Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b23178f764e1f470a75

Added to database: 10/15/2025, 1:01:23 PM

Last enriched: 10/15/2025, 1:20:35 PM

Last updated: 10/16/2025, 2:52:09 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats