Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4505: Unrestricted Upload in eosphoros-ai DB-GPT

0
Medium
VulnerabilityCVE-2026-4505cvecve-2026-4505
Published: Fri Mar 20 2026 (03/20/2026, 20:02:14 UTC)
Source: CVE Database V5
Vendor/Project: eosphoros-ai
Product: DB-GPT

Description

A vulnerability has been found in eosphoros-ai DB-GPT up to 0.7.5. This issue affects the function module_plugin.refresh_plugins of the file packages/dbgpt-serve/src/dbgpt_serve/agent/hub/controller.py of the component FastAPI Endpoint. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 03/20/2026, 20:24:14 UTC

Technical Analysis

CVE-2026-4505 is a vulnerability identified in the eosphoros-ai DB-GPT product, specifically affecting versions 0.7.0 through 0.7.5. The issue resides in the FastAPI endpoint's module_plugin.refresh_plugins function within the file dbgpt_serve/agent/hub/controller.py. This vulnerability allows an attacker to perform unrestricted file uploads remotely without requiring authentication or user interaction. The unrestricted upload capability means an attacker can upload arbitrary files, which could include malicious payloads such as web shells or scripts, potentially leading to remote code execution or further system compromise. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and does not require privileges (PR:L) or user interaction (UI:N). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant compromise if exploited. The vendor was contacted early but has not responded or issued a patch, and no known exploits have been detected in the wild yet. The CVSS 4.0 score of 5.3 reflects a medium severity level, indicating moderate risk. The lack of patch availability and public disclosure increases the urgency for organizations to implement mitigations. The vulnerability's presence in a FastAPI endpoint suggests that secure coding practices and input validation were insufficient in this component, highlighting the need for improved security hygiene in API design and plugin management.

Potential Impact

The unrestricted upload vulnerability in DB-GPT can have several impacts on affected organizations. Attackers could upload malicious files, potentially leading to remote code execution, data exfiltration, or disruption of services. This could compromise the confidentiality, integrity, and availability of the affected systems and any data processed by DB-GPT. Organizations relying on DB-GPT for AI-driven database management or analytics may face operational disruptions, reputational damage, and regulatory compliance issues if sensitive data is exposed or systems are compromised. The medium severity rating suggests that while exploitation is feasible, the impact might be contained if proper network segmentation and monitoring are in place. However, the absence of vendor patches and public exploit code increases the risk of future attacks. Given the remote attack vector and lack of authentication requirements, attackers can target exposed DB-GPT instances directly, increasing the attack surface. This vulnerability could be leveraged as an initial access vector in multi-stage attacks, especially in environments where DB-GPT is integrated with critical infrastructure or sensitive data repositories.

Mitigation Recommendations

To mitigate CVE-2026-4505, organizations should immediately restrict external access to the DB-GPT FastAPI endpoints, ideally limiting them to trusted internal networks or VPNs. Implement strict network segmentation and firewall rules to prevent unauthorized access. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the module_plugin.refresh_plugins endpoint. Conduct thorough input validation and sanitization on all file upload functionalities, ensuring only authorized file types and sizes are accepted. Monitor logs for unusual upload activity or access patterns to the vulnerable endpoint. If possible, disable or restrict the plugin refresh functionality until a vendor patch or official fix is available. Engage in proactive threat hunting to detect any signs of exploitation or lateral movement stemming from this vulnerability. Maintain up-to-date backups and have an incident response plan ready to contain potential breaches. Finally, advocate for vendor engagement and track any future patches or advisories related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-20T14:03:16.786Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bda974e32a4fbe5fca0bc6

Added to database: 3/20/2026, 8:09:24 PM

Last enriched: 3/20/2026, 8:24:14 PM

Last updated: 3/20/2026, 10:21:33 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses