๐Ÿ” CVE Alert

CVE-2026-27483

HIGH 8.8

MindsDB has Path Traversal in /api/files Leading to Remote Code Execution

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. The vulnerability exists in the "Upload File" module, which corresponds to the API endpoint /api/files. Since the multipart file upload does not perform security checks on the uploaded file path, an attacker can perform path traversal by using `../` sequences in the filename field. The file write operation occurs before calling clear_filename and save_file, meaning there is no filtering of filenames or file types, allowing arbitrary content to be written to any path on the server. Version 25.9.1.1 patches the issue.

CWE CWE-22
Vendor mindsdb
Product mindsdb
Published Feb 24, 2026
Last Updated Feb 27, 2026
Stay Ahead of the Next One

Get instant alerts for mindsdb mindsdb

Be the first to know when new high vulnerabilities affecting mindsdb mindsdb are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

mindsdb / mindsdb
< 25.9.1.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/mindsdb/mindsdb/security/advisories/GHSA-4894-xqv6-vrfq github.com: https://github.com/mindsdb/mindsdb/commit/87a44bdb2b97f963e18f10a068e1a1e2690505ef github.com: https://github.com/mindsdb/mindsdb/releases/tag/v25.9.1.1