Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8551: CWE-23 Relative Path Traversal in modelscope modelscope/agentscope

0
Critical
VulnerabilityCVE-2024-8551cvecve-2024-8551cwe-23
Published: Thu Mar 20 2025 (03/20/2025, 10:10:21 UTC)
Source: CVE Database V5
Vendor/Project: modelscope
Product: modelscope/agentscope

Description

A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially leading to the exposure or modification of sensitive information such as configuration files, API keys, and hardcoded passwords.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:19:57 UTC

Technical Analysis

CVE-2024-8551 is a critical security vulnerability classified under CWE-23 (Relative Path Traversal) found in the modelscope/agentscope software suite. This vulnerability specifically affects the save-workflow and load-workflow functionalities, which handle JSON file operations on the filesystem. Due to insufficient validation of file paths, an attacker can manipulate the input to traverse directories and gain unauthorized access to arbitrary JSON files. This can lead to reading sensitive information such as configuration files, API keys, and hardcoded passwords, or writing/modifying these files to alter application behavior or implant malicious configurations. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 3.0 score of 9.1 reflects the ease of exploitation (network vector, low complexity), no privileges required, and a significant impact on integrity and availability of the system. Although no active exploits have been reported, the critical nature of this flaw demands immediate attention. The lack of specified affected versions suggests that all versions prior to the fix are vulnerable. The vulnerability could be leveraged to compromise the confidentiality and integrity of systems running modelscope/agentscope, potentially enabling further attacks or persistent access.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on modelscope/agentscope for AI workflows or automation. Exposure or modification of sensitive JSON configuration files could lead to credential leakage, unauthorized access to internal systems, or disruption of critical services. Industries such as finance, healthcare, and manufacturing that integrate AI solutions may face operational downtime, data breaches, or compliance violations under GDPR due to unauthorized data exposure. The ease of remote exploitation without authentication increases the likelihood of attacks, potentially affecting cloud-hosted or on-premise deployments. The integrity and availability impacts could disrupt business continuity and damage organizational reputation. Additionally, attackers could use this vulnerability as a foothold for lateral movement within networks, escalating the overall threat landscape for European enterprises.

Mitigation Recommendations

To mitigate CVE-2024-8551, organizations should immediately monitor for updates and apply official patches from the modelscope project once released. Until patches are available, restrict network access to the save-workflow and load-workflow endpoints using firewalls or network segmentation to limit exposure. Implement strict input validation and sanitization on any user-supplied file paths to prevent directory traversal sequences. Employ filesystem access controls to ensure the application process has the minimum necessary permissions, preventing unauthorized file reads or writes outside designated directories. Enable logging and alerting on suspicious file operations involving JSON files or unexpected path patterns. Conduct thorough code reviews and penetration testing focused on path traversal vulnerabilities in similar components. For cloud deployments, use container or VM isolation to limit the blast radius. Finally, educate developers and administrators about secure coding practices related to file handling to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-09-06T19:38:21.423Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2d178f764e1f470e5b

Added to database: 10/15/2025, 1:01:33 PM

Last enriched: 10/15/2025, 1:19:57 PM

Last updated: 12/1/2025, 3:53:08 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats