CVE-2025-68472

CVE-2025-68472: The Absolute Path to Destruction in MindsDB

Alon Barad
Alon Barad
Software Engineer

Jan 12, 2026·6 min read·12 visits

Executive Summary (TL;DR)

MindsDB forgot how Python's `os.path.join` works. By sending a JSON payload with an absolute path to an unauthenticated PUT endpoint, attackers can trick the server into 'moving' critical system files (like `/etc/passwd`) into the database storage. This allows for data exfiltration via SQL queries and causes a Denial of Service by deleting the source file from the disk.

An unauthenticated path traversal vulnerability in MindsDB's file upload API allows attackers to hijack absolute paths, moving sensitive system files into public storage and deleting them from the OS.

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Affected Systems

MindsDB < 25.11.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
MindsDB
MindsDB
< 25.11.125.11.1
AttributeDetail
Attack VectorNetwork (API)
CVSS v3.18.1 (High)
CWECWE-22 (Path Traversal)
ImpactInfo Disclosure & DoS
Exploit StatusPoC Available
AuthenticationNone Required
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Vulnerability Timeline

Patch Released in version 25.11.1
2025-11-01
Public Disclosure & CVE Published
2026-01-12

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.