Vulnerability Description
AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to file_path without checking the validity of the filename. The variable file_path is then passed as a parameter to the function `file.save`, so that the file in the request body can be saved to any location in the file system through directory traversal.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Astrbot | Astrbot | 3.5.22 |
Related Weaknesses (CWE)
References
- https://github.com/DYX217/vulnerability-explore/blob/main/2/README.mdExploitThird Party Advisory
FAQ
What is CVE-2025-57698?
CVE-2025-57698 is a vulnerability with a CVSS score of 7.5 (HIGH). AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function install_plugin_upload of the interface '/plugin/install-upload' parses the filename from the request body pro...
How severe is CVE-2025-57698?
CVE-2025-57698 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-57698?
Check the references section above for vendor advisories and patch information. Affected products include: Astrbot Astrbot.