Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5001: Unrestricted Upload in PromtEngineer localGPT

0
Medium
VulnerabilityCVE-2026-5001cvecve-2026-5001
Published: Sat Mar 28 2026 (03/28/2026, 16:00:14 UTC)
Source: CVE Database V5
Vendor/Project: PromtEngineer
Product: localGPT

Description

CVE-2026-5001 is a medium severity vulnerability in PromtEngineer localGPT that allows remote attackers to perform unrestricted file uploads via the do_POST function in backend/server. py. This flaw enables unauthenticated attackers to upload arbitrary files without restrictions, potentially leading to remote code execution or system compromise. The vulnerability affects all rolling release versions up to commit 4d41c7d1713b16b216d8e062e51a5dd88b20b054. No patch or vendor response is currently available, and a public exploit has been published. The vulnerability does not require user interaction or authentication and has a CVSS 4. 0 base score of 6. 9. Organizations using localGPT in production environments are at risk of unauthorized access and system integrity breaches. Mitigation requires immediate implementation of custom upload restrictions, network-level controls, and monitoring until an official patch is released.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 16:36:02 UTC

Technical Analysis

CVE-2026-5001 is a vulnerability identified in the PromtEngineer localGPT product, specifically within the do_POST function of the backend/server.py file. The flaw allows an attacker to perform unrestricted file uploads remotely without any authentication or user interaction. This means that an attacker can send specially crafted HTTP POST requests to the server, uploading arbitrary files that could include malicious scripts or executables. The product uses a rolling release strategy, making it difficult to pinpoint exact version numbers, but the vulnerability affects all versions up to the specified commit hash 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The vendor has not responded to early disclosure attempts, and no official patches or updates have been released. The vulnerability has a CVSS 4.0 score of 6.9, indicating a medium severity level, with network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability at a low level. Although no known exploits in the wild have been reported yet, a public exploit is available, increasing the risk of exploitation. The unrestricted upload can lead to remote code execution, data manipulation, or denial of service if exploited successfully.

Potential Impact

The unrestricted upload vulnerability in localGPT can have significant impacts on organizations deploying this software. Attackers can upload malicious files that may lead to remote code execution, allowing full system compromise. This can result in unauthorized data access, data corruption, or service disruption. Since the vulnerability requires no authentication or user interaction, it can be exploited by any remote attacker scanning for vulnerable instances. The rolling release nature of the product complicates patch management and vulnerability tracking, increasing exposure time. Organizations relying on localGPT for AI or language model services may face operational downtime, data breaches, or reputational damage. Additionally, if localGPT is integrated into larger systems or workflows, the compromise could cascade, affecting broader infrastructure.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict network access to the localGPT backend server by limiting exposure to trusted IP addresses or internal networks only. 2) Deploy web application firewalls (WAFs) with rules to detect and block suspicious file upload patterns or HTTP POST requests targeting the vulnerable endpoint. 3) Implement custom validation and sanitization on the server side to restrict file types, sizes, and content for uploads, if possible by modifying the source code. 4) Monitor logs for unusual upload activity or unexpected file creations in the server directories. 5) Consider containerizing or sandboxing the localGPT service to limit the impact of a potential compromise. 6) Regularly review and update access controls and credentials associated with the service. 7) Stay alert for vendor updates or community patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-27T13:48:24.504Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c7ffec2b68dbd88e794fbe

Added to database: 3/28/2026, 4:21:00 PM

Last enriched: 3/28/2026, 4:36:02 PM

Last updated: 3/28/2026, 5:42:22 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses