Gecko will be at Black Hat and DEFCON in Las Vegas

Security Research

Vulnerabilities discovered by Gecko's Scanner.
Each finding was responsibly disclosed to the vendor.

30

Assigned CVEs

22

Disclosure Process

15

Vulnerabilities Fixed

Featured post

Latest security research finding

Discoveries

Security vulnerabilities discovered and responsibly disclosed

BLOG-2025-001
Blog Post

How Gecko Discovered 30 0-Day Vulnerabilities No AppSec Tool Found

Previously, there were entire classes of business logic and multi-step vulnerabilities that have long been invisible to SAST. Today, that changes.

View Details
CVE-2025-48889
5.3 Medium

CVE-2025-48889: Gradio Unauthorized File Copy via Path Manipulation

Arbitrary file copy vulnerability in Gradio's flagging feature allows unauthenticated attackers to copy any readable file from the server's filesystem.

View Details
CVE-2025-51458
6.5 Medium

CVE-2025-51458: DB-GPT SQLI via CVE Bypass (CVE-2024-10835 & CVE-2024-10901)

SQL injection vulnerability in DB-GPT 0.7.0 despite fixes for prior CVEs, affecting multiple database endpoints.

View Details
CVE-2025-51459
6.5 Medium

CVE-2025-51459: DB-GPT RCE in DB-GPT Plugin Upload System

Remote code execution vulnerability in DB-GPT's plugin upload functionality through unsafe Python code execution.

View Details
CVE-2025-51462
6.1 Medium

CVE-2025-51462: Ragflow XSS in Dialog Configuration

Stored cross-site scripting vulnerability in Ragflow's dialog configuration functionality allowing malicious HTML/JavaScript execution.

View Details
CVE-2025-51463
7 Medium

CVE-2025-51463: Aim Path Traversal in Server Backup Restoration

A path traversal vulnerability was found in AIM server. This vulnerability allows remote attackers to write arbitrary files on the server's filesystem via a malicious tar file extraction.

View Details
CVE-2025-51464
5.3 Medium

CVE-2025-51464: Stored XSS in AIM Reports

Stored cross-site scripting vulnerability in AIM Reports allowing malicious Python code to execute arbitrary JavaScript in users' browsers.

View Details
CVE-2025-51471
6.9 Medium

CVE-2025-51471: Ollama Cross-Domain Authentication Token Exposure

Authentication flow vulnerability in Ollama's model pulling mechanism allowing cross-domain token redirection and theft.

View Details
CVE-2025-51472
6.5 Medium

CVE-2025-51472: SuperAGI RCE via Unsafe Eval in Template Config

Remote code execution vulnerability in SuperAGI through unsafe eval() usage in agent template configuration processing.

View Details
CVE-2025-51475
5 Medium

CVE-2025-51475: SuperAGI AFO in File Upload Endpoint

Arbitrary file overwrite vulnerability in SuperAGI's file upload functionality due to insufficient path sanitization.

View Details
CVE-2025-51479
5.4 Medium

CVE-2025-51479: ONYX Authorization Bypass in Enterprise Edition Group Management API

Authorization bypass vulnerability in ONYX Enterprise Edition allowing curators to manipulate groups outside their authorized scope.

View Details
CVE-2025-51480
8.8 High

CVE-2025-51480: ONNX Arbitrary File Overwrite in `save_external_data`

Arbitrary file overwrite vulnerability in ONNX library's save_external_data function through path traversal attacks.

View Details
CVE-2025-51481
6.6 Medium

CVE-2025-51481: Dagster LFI in gRPC Server's ExternalNotebookData Endpoint

Local file inclusion vulnerability in Dagster's gRPC server allowing arbitrary file reading through path traversal in notebook data endpoint.

View Details
CVE-2025-51482
8.8 High

CVE-2025-51482: Letta RCE via Unsanitized Tool Execution Endpoint

Remote code execution vulnerability in Letta's tool execution endpoint through unsafe Python code execution in inadequate sandbox.

View Details
CVE-2025-53944
7.7 High

CVE-2025-53944: AutoGPT Authorization Bypass in Graph Execution External API

Authorization bypass vulnerability in AutoGPT's external API allowing authenticated users to access execution results from other users' graph executions.

View Details
CVE-2025-54381
9.9 Critical

CVE-2025-54381: BentoML SSRF in File Upload Processing

Server-side request forgery vulnerability in BentoML's file upload processing system allowing arbitrary HTTP requests from the server.

View Details