CVE-2026-26057
Unauthenticated API Server DoS and File Upload in Skill Scanner
Publication date: 2026-02-19
Last updated on: 2026-02-26
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | skill_scanner | to 1.0.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-668 | The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the API Server of Skill Scanner, a security scanner for AI Agent Skills. Due to an erroneous binding to multiple interfaces, an unauthenticated remote attacker can interact with the API Server. The attacker can either cause a denial of service (DoS) by consuming excessive resources (memory starvation) or upload arbitrary files to any folder on the affected device.
The vulnerability affects Skill Scanner version 1.0.1 and earlier when the API Server is enabled, which is not the default setting. Versions 1.0.2 and later have fixed this issue.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to a denial of service condition by exhausting system memory, making the Skill Scanner service unavailable.
Additionally, an attacker could upload arbitrary files to any folder on the affected device, potentially leading to unauthorized code execution, data manipulation, or further compromise of the system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying if the Skill Scanner API Server is enabled and exposed on your device. Since the vulnerability involves an erroneous binding to multiple interfaces, checking for open API Server ports and unusual API requests could help detect exploitation attempts.
You can use network scanning tools to detect if the API Server is running and accessible remotely. For example, using nmap to scan for open ports commonly used by the Skill Scanner API Server:
- nmap -p <api_server_port> <target_ip>
Additionally, monitoring logs for unusual API requests or file upload attempts to arbitrary folders can help detect exploitation.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Disable the Skill Scanner API Server if it is not required, as it is not enabled by default.
- If the API Server is needed, upgrade Skill Scanner to version 1.0.2 or later, which contains the fix for this vulnerability.
- Restrict network access to the API Server by limiting exposure to trusted networks only.
- Monitor system and network logs for signs of exploitation attempts, such as unusual API requests or unexpected file uploads.