CVE-2024-6090: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gaizhenbiao gaizhenbiao/chuanhuchatgpt
A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in `.json` on the target system, leading to a denial of service as users are unable to authenticate.
AI Analysis
Technical Summary
CVE-2024-6090 is a path traversal vulnerability (CWE-22) identified in the gaizhenbiao/chuanhuchatgpt software, specifically in version 20240410. The flaw allows an attacker to manipulate file path inputs to bypass directory restrictions, enabling deletion of arbitrary files ending with the .json extension on the target system. This includes the ability to delete other users' chat histories stored as JSON files, as well as critical authentication-related files, resulting in denial of service by preventing legitimate user authentication. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.0 score of 7.5 reflects high severity due to network attack vector, low attack complexity, no privileges required, and a significant impact on availability. No patches or known exploits have been reported yet, but the vulnerability poses a serious threat to the integrity of stored data and the availability of the chat service. The root cause is improper limitation of pathname inputs, allowing directory traversal sequences to escape intended restricted directories. This indicates insufficient input validation and lack of secure coding practices around file system operations within the application.
Potential Impact
For European organizations using gaizhenbiao/chuanhuchatgpt, this vulnerability can lead to critical service disruptions by deleting essential JSON files, including authentication data and user chat histories. This results in denial of service, loss of user data, and potential operational downtime. Organizations relying on this software for communication or AI chatbot services may face degraded user trust and productivity loss. The lack of authentication requirement means attackers can exploit this remotely without insider access, increasing exposure. If exploited at scale, it could disrupt multiple users or departments simultaneously. Additionally, deletion of authentication files may require costly recovery efforts and incident response. The impact extends beyond availability to potential indirect effects on confidentiality if attackers leverage deleted data to cause confusion or cover tracks. Overall, the threat undermines service reliability and data integrity critical to business continuity.
Mitigation Recommendations
Immediate mitigation should focus on applying any available patches from the vendor once released. In the absence of patches, organizations should implement strict input validation to sanitize and canonicalize all file path inputs, ensuring traversal sequences (e.g., ../) are blocked. Employing allowlists for file names and extensions can reduce risk. Restrict file deletion operations to authenticated and authorized users only, enforcing role-based access controls. Monitoring file system activity for unusual deletion patterns of .json files can provide early detection. Isolating the application in a sandbox or container with limited file system permissions can minimize impact. Regular backups of critical JSON files, especially authentication data and user histories, are essential for recovery. Network-level protections such as web application firewalls (WAFs) can help detect and block path traversal attempts. Finally, conduct code reviews and security testing focused on file handling to prevent similar issues in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-6090: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gaizhenbiao gaizhenbiao/chuanhuchatgpt
Description
A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in `.json` on the target system, leading to a denial of service as users are unable to authenticate.
AI-Powered Analysis
Technical Analysis
CVE-2024-6090 is a path traversal vulnerability (CWE-22) identified in the gaizhenbiao/chuanhuchatgpt software, specifically in version 20240410. The flaw allows an attacker to manipulate file path inputs to bypass directory restrictions, enabling deletion of arbitrary files ending with the .json extension on the target system. This includes the ability to delete other users' chat histories stored as JSON files, as well as critical authentication-related files, resulting in denial of service by preventing legitimate user authentication. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.0 score of 7.5 reflects high severity due to network attack vector, low attack complexity, no privileges required, and a significant impact on availability. No patches or known exploits have been reported yet, but the vulnerability poses a serious threat to the integrity of stored data and the availability of the chat service. The root cause is improper limitation of pathname inputs, allowing directory traversal sequences to escape intended restricted directories. This indicates insufficient input validation and lack of secure coding practices around file system operations within the application.
Potential Impact
For European organizations using gaizhenbiao/chuanhuchatgpt, this vulnerability can lead to critical service disruptions by deleting essential JSON files, including authentication data and user chat histories. This results in denial of service, loss of user data, and potential operational downtime. Organizations relying on this software for communication or AI chatbot services may face degraded user trust and productivity loss. The lack of authentication requirement means attackers can exploit this remotely without insider access, increasing exposure. If exploited at scale, it could disrupt multiple users or departments simultaneously. Additionally, deletion of authentication files may require costly recovery efforts and incident response. The impact extends beyond availability to potential indirect effects on confidentiality if attackers leverage deleted data to cause confusion or cover tracks. Overall, the threat undermines service reliability and data integrity critical to business continuity.
Mitigation Recommendations
Immediate mitigation should focus on applying any available patches from the vendor once released. In the absence of patches, organizations should implement strict input validation to sanitize and canonicalize all file path inputs, ensuring traversal sequences (e.g., ../) are blocked. Employing allowlists for file names and extensions can reduce risk. Restrict file deletion operations to authenticated and authorized users only, enforcing role-based access controls. Monitoring file system activity for unusual deletion patterns of .json files can provide early detection. Isolating the application in a sandbox or container with limited file system permissions can minimize impact. Regular backups of critical JSON files, especially authentication data and user histories, are essential for recovery. Network-level protections such as web application firewalls (WAFs) can help detect and block path traversal attempts. Finally, conduct code reviews and security testing focused on file handling to prevent similar issues in future releases.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-06-17T18:13:08.042Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2a178f764e1f470d44
Added to database: 10/15/2025, 1:01:30 PM
Last enriched: 10/15/2025, 1:35:03 PM
Last updated: 10/16/2025, 2:53:24 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumCVE-2025-46752: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.