CVE-2026-22661
Path Traversal in prompts.chat Skill Files Enables Code Execution
Publication date: 2026-04-03
Last updated on: 2026-04-13
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fka | prompts.chat | to 2026-03-25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in prompts.chat prior to commit 0f8d4c3 and involves a path traversal issue in the handling of skill files.
Attackers can craft malicious ZIP archives containing filenames with path traversal sequences (such as ../) that are not properly sanitized by the server.
When these ZIP archives are extracted by the vulnerable tool, files can be written outside the intended directory, potentially overwriting important files like shell initialization files.
This allows attackers to execute arbitrary code on the client system.
How can this vulnerability impact me? :
This vulnerability can have serious impacts including unauthorized code execution on your system.
Because attackers can write arbitrary files outside the intended directories, they may overwrite critical configuration or initialization files, leading to system compromise.
The CVSS v3.1 score of 8.1 (High) and v4.0 score of 8.6 (High) reflect the severity and ease of exploitation, as it requires no privileges and low attack complexity.