Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.
History

Mon, 06 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Mastra-ai
Mastra-ai mastra
Vendors & Products Mastra-ai
Mastra-ai mastra

Fri, 03 Oct 2025 22:45:00 +0000

Type Values Removed Values Added
Description Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.
Title Mastra Docs MCP Server `@mastra/mcp-docs-server` Leads to Information Exposure
Weaknesses CWE-548
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-10-03T22:37:09.027Z

Updated: 2025-10-06T15:52:03.828Z

Reserved: 2025-09-29T20:25:16.182Z

Link: CVE-2025-61685

cve-icon Vulnrichment

Updated: 2025-10-06T15:51:58.284Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-03T23:15:29.870

Modified: 2025-10-06T14:56:47.823

Link: CVE-2025-61685

cve-icon Redhat

No data.