CVE-2026-26057
Received Received - Intake
Unauthenticated API Server DoS and File Upload in Skill Scanner

Publication date: 2026-02-19

Last updated on: 2026-02-26

Assigner: GitHub, Inc.

Description
Skill Scanner is a security scanner for AI Agent Skills that detects prompt injection, data exfiltration, and malicious code patterns. A vulnerability in the API Server of Skill Scanner could allow a unauthenticated, remote attacker to interact with the server API and either trigger a denial of service (DoS) condition or upload arbitrary files. This vulnerability is due to an erroneous binding to multiple interfaces. An attacker could exploit this vulnerability by sending API requests to a device exposing the affected API Server. A successful exploit could allow the attacker to consume an excessive amount of resources (memory starvation) or to upload files to arbitrary folders on the affected device. This vulnerability affects Skill-scanner 1.0.1 and earlier releases when the API Server is enabled. The API Server is not enabled by default. Skill-scanner software releases 1.0.2 and later contain the fix for this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-26
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco skill_scanner to 1.0.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-668 The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the API Server of Skill Scanner, a security scanner for AI Agent Skills. Due to an erroneous binding to multiple interfaces, an unauthenticated remote attacker can interact with the API Server. The attacker can either cause a denial of service (DoS) by consuming excessive resources (memory starvation) or upload arbitrary files to any folder on the affected device.

The vulnerability affects Skill Scanner version 1.0.1 and earlier when the API Server is enabled, which is not the default setting. Versions 1.0.2 and later have fixed this issue.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to a denial of service condition by exhausting system memory, making the Skill Scanner service unavailable.

Additionally, an attacker could upload arbitrary files to any folder on the affected device, potentially leading to unauthorized code execution, data manipulation, or further compromise of the system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying if the Skill Scanner API Server is enabled and exposed on your device. Since the vulnerability involves an erroneous binding to multiple interfaces, checking for open API Server ports and unusual API requests could help detect exploitation attempts.

You can use network scanning tools to detect if the API Server is running and accessible remotely. For example, using nmap to scan for open ports commonly used by the Skill Scanner API Server:

  • nmap -p <api_server_port> <target_ip>

Additionally, monitoring logs for unusual API requests or file upload attempts to arbitrary folders can help detect exploitation.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Disable the Skill Scanner API Server if it is not required, as it is not enabled by default.
  • If the API Server is needed, upgrade Skill Scanner to version 1.0.2 or later, which contains the fix for this vulnerability.
  • Restrict network access to the API Server by limiting exposure to trusted networks only.
  • Monitor system and network logs for signs of exploitation attempts, such as unusual API requests or unexpected file uploads.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart