CVE-2026-22661
🟡 Monitoruj
Wykorzystanie podatności w prompts.chat pozwala na zapisanie dowolnych plików na systemie klienta.
CVSS
8.1
EPSS
0.1%
Exploit
none
Vendor
fka
Opis źródłowy (NVD)
prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path traversal sequences. Attackers can exploit missing server-side filename validation to inject path traversal sequences ../ into skill file archives, which when extracted by vulnerable tools write files outside the intended directory and overwrite shell initialization files to achieve code execution.
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-03 21:17:08 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 18:23:32 UTC |
Referencje
- https://github.com/f/prompts.chat/commit/0f8d4c381abd7b2d7478c9fdee9522149c2d65e5 (disclosure@vulncheck.com) [Patch]
- https://github.com/f/prompts.chat/pull/1101 (disclosure@vulncheck.com) [Issue Tracking, Patch, Vendor Advisory]
- https://www.vulncheck.com/advisories/prompts-chat-path-traversal-via-skill-file-handling (disclosure@vulncheck.com) [Third Party Advisory]