CVE-2025-57697
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-07

Last updated on: 2025-12-05

Assigner: MITRE

Description
AstrBot Project v3.5.22 has an arbitrary file read vulnerability in function _encode_image_bs64. Since the _encode_image_bs64 function defined in entities.py opens the image specified by the user in the request body and returns the image content as a base64-encoded string without checking the legitimacy of the image path, attackers can construct a series of malicious URLs to read any specified file, resulting in sensitive data leakage.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-07
Last Modified
2025-12-05
Generated
2026-05-07
AI Q&A
2025-11-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
astrbot astrbot 3.5.22
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in AstrBot Project v3.5.22 within the _encode_image_bs64 function. The function opens an image file specified by the user in the request body and returns its content as a base64-encoded string without verifying if the image path is legitimate. This allows attackers to craft malicious URLs to read arbitrary files on the system, leading to unauthorized access to sensitive data.


How can this vulnerability impact me? :

The vulnerability can lead to sensitive data leakage by allowing attackers to read arbitrary files on the system. This unauthorized file access can expose confidential information, potentially compromising system security and user privacy.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart