CVE-2026-28795

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to manipulate the file_format parameter in the OpenChatBI tool, potentially letting them access or overwrite files on the server that they shouldn't be able to reach. It requires the attacker to have access to the tool and to exploit the flaw before the software is updated to version 0.2.2, which fixes the issue.

Technical Description

OpenChatBI is an intelligent chat-based BI tool powered by large language models, designed to help users query, analyze, and visualize data through natural language conversations. Prior to version 0.2.2, the save_report tool in openchatbi/tool/save_report.py suffers from a critical path traversal vulnerability due to insufficient input sanitization of the file_format parameter. This issue has been patched in version 0.2.2.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,579($1K-$5K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Mar 6, 2026

about 1 month ago

Last Modified

Mar 10, 2026

28 days ago

Vendor

zhongyu09

Product

openchatbi