CVE-2025-6283
low-risk
Published 2025-06-19
A vulnerability was found in xataio Xata Agent up to 0.3.0. It has been classified as problematic. This affects the function GET of the file apps/dbagent/src/app/api/evals/route.ts. The manipulation of the argument passed leads to path traversal. Upgrading to version 0.3.1 is able to address this issue. The patch is named 03f27055e0cf5d4fa7e874d34ce8c74c7b9086cc. It is recommended to upgrade the affected component.
Do I need to act?
-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
ADJACENT_NETWORK
/ LOW complexity
Affected Products (1)
Agent
Affected Vendors
References (8)
Issue Tracking
https://github.com/xataio/agent/pull/191
Release Notes
https://github.com/xataio/agent/releases/tag/v0.3.1
Permissions Required
https://vuldb.com/?ctiid.313287
Third Party Advisory
https://vuldb.com/?id.313287
Third Party Advisory
https://vuldb.com/?submit.593627
19
/ 100
low-risk
Severity
13/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal