Browse all 3 CVE security advisories affecting agnaistic. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Agnaistic provides enterprise-grade authentication and access management solutions, focusing on secure identity verification for web applications and APIs. Historically, the platform has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure session management. While no major public security incidents have been documented, the three recorded CVEs highlight ongoing challenges in input sanitization and access control. The system's modular architecture allows for flexible deployment but introduces potential attack surfaces in third-party integrations. Security teams should prioritize patching and regular security assessments to mitigate risks associated with these common vulnerability classes.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-47171 | Agnai vulnerable to Relative Path Traversal in Image Upload — agnaiCWE-35 | 4.3 | Medium | 2024-09-26 |
| CVE-2024-47170 | Agnai File Disclosure Vulnerability: JSON via Path Traversal — agnaiCWE-35 | 4.3 | Medium | 2024-09-26 |
| CVE-2024-47169 | Agnai vulnerable to Remote Code Execution via JS Upload using Directory Traversal — agnaiCWE-35 | 8.8 | High | 2024-09-26 |
This page lists every published CVE security advisory associated with agnaistic. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.