CVE-2025-6773: HKUDS LightRAG allows Path Traversal via function upload_to_input_dir
(updated )
A vulnerability was found in HKUDS LightRAG up to 1.3.8. It has been declared as critical. Affected by this vulnerability is the function upload_to_input_dir of the file lightrag/api/routers/document_routes.py of the component File Upload. The manipulation of the argument file.filename leads to path traversal. It is possible to launch the attack on the local host. The identifier of the patch is 60777d535b719631680bcf5d0969bdef79ca4eaf. It is recommended to apply a patch to fix this issue.
References
- github.com/HKUDS/LightRAG
- github.com/HKUDS/LightRAG/commit/60777d535b719631680bcf5d0969bdef79ca4eaf
- github.com/HKUDS/LightRAG/issues/1692
- github.com/HKUDS/LightRAG/issues/1692
- github.com/advisories/GHSA-v9w6-9hq9-33ch
- nvd.nist.gov/vuln/detail/CVE-2025-6773
- vuldb.com/?ctiid.314089
- vuldb.com/?id.314089
- vuldb.com/?submit.601276
Code Behaviors & Features
Detect and mitigate CVE-2025-6773 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →