AstrBot Project v3.5.22 contains a directory traversal vulnerability. The handler function installpluginupload of the interface '/plugin/install-upload' parses the filename from the request body provided by the user, and directly uses the filename to assign to filepath without checking the validity of the filename. The variable filepath is then passed as a parameter to the function file.save, so that the file in the request body can be saved to any location in the file system through directory traversal.
{
"severity": "HIGH",
"cwe_ids": [
"CWE-22"
],
"github_reviewed_at": "2025-11-07T20:49:17Z",
"nvd_published_at": "2025-11-07T17:15:47Z",
"github_reviewed": true
}