CVE-2025-6278 – upsonic
Package
Manager: pip
Name: upsonic
Vulnerable Version: >=0 <0.56.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.00102 pctl0.28602
Details
Upsonic is vulnerable to Path Traversal attack through its os.path.join function A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerability affects the function os.path.join of the file markdown/server.py. The manipulation of the argument file.filename leads to path traversal. The exploit has been disclosed to the public and may be used.
Metadata
Created: 2025-06-19T21:31:19Z
Modified: 2025-07-09T01:00:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-8jf4-fcjr-68c2/GHSA-8jf4-fcjr-68c2.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-8jf4-fcjr-68c2
Finding: F063
Auto approve: 1