CrowdSec
4/10CrowdSec Score

Stitionai/devika - Path Traversal (CVE-2024-5334)

Published on27-06-2024
First seen on28-06-2025

0Exploiting IPs reported

A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.

CrowdSec analysis

CVE-2024-5334, a vulnerability in stitionai/devika repository allows local file read. Attackers can exploit this flaw by sending malicious snapshot_path, leading to arbitrary file read from the system.

CrowdSec has been tracking this vulnerability and its exploits since 7th of May 2025.

Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2024-5334 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. CrowdSec data also reveals a clear uptick in attacks involving CVE-2024-5334 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit stitionai/devika by sending GET requests to the /api/get-browser-snapshot to achieve local file read.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.