
We found results for “”
CVE-2025-61685
Good to know:


Date: October 3, 2025
Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Exposure of Information Through Directory Listing
CWE-548Top Fix

Upgrade Version
Upgrade to version @mastra/mcp-docs-server - 0.13.20;https://github.com/mastra-ai/mastra.git - @mastra/mcp-docs-server@0.13.20
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |