AstrBot Project v3.5.22 has an arbitrary file read vulnerability in function encodeimagebs64. Since the _encodeimage_bs64 function defined in entities.py opens the image specified by the user in the request body and returns the image content as a base64-encoded string without checking the legitimacy of the image path, attackers can construct a series of malicious URLs to read any specified file, resulting in sensitive data leakage.
{
"severity": "MODERATE",
"cwe_ids": [
"CWE-22"
],
"github_reviewed_at": "2025-11-07T20:50:54Z",
"nvd_published_at": "2025-11-07T18:15:36Z",
"github_reviewed": true
}