CVE-2026-39981
🟡 Monitoruj
Błąd w funkcji safe_join() w AGiXT pozwala na atak typu traversal, co umożliwia dostęp do plików serwera.
CVSS
8.8
EPSS
0.5%
Exploit
none
Vendor
Opis źródłowy (NVD)
AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. This vulnerability is fixed in 1.9.2.
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.5% |
| Opublikowano (NVD) | 2026-04-09 18:17:02 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 15:02:27 UTC |
Referencje
- https://github.com/Josh-XT/AGiXT/commit/2079ea5a88fa671a921bf0b5eba887a5a1b73d5f (security-advisories@github.com)
- https://github.com/Josh-XT/AGiXT/releases/tag/v1.9.2 (security-advisories@github.com)
- https://github.com/Josh-XT/AGiXT/security/advisories/GHSA-5gfj-64gh-mgmw (security-advisories@github.com)