CVE-2026-22661
Received Received - Intake
Path Traversal in prompts.chat Skill Files Enables Code Execution

Publication date: 2026-04-03

Last updated on: 2026-04-13

Assigner: VulnCheck

Description
prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path traversal sequences. Attackers can exploit missing server-side filename validation to inject path traversal sequences ../ into skill file archives, which when extracted by vulnerable tools write files outside the intended directory and overwrite shell initialization files to achieve code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fka prompts.chat to 2026-03-25 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in prompts.chat prior to commit 0f8d4c3 and involves a path traversal issue in the handling of skill files.

Attackers can craft malicious ZIP archives containing filenames with path traversal sequences (such as ../) that are not properly sanitized by the server.

When these ZIP archives are extracted by the vulnerable tool, files can be written outside the intended directory, potentially overwriting important files like shell initialization files.

This allows attackers to execute arbitrary code on the client system.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized code execution on your system.

Because attackers can write arbitrary files outside the intended directories, they may overwrite critical configuration or initialization files, leading to system compromise.

The CVSS v3.1 score of 8.1 (High) and v4.0 score of 8.6 (High) reflect the severity and ease of exploitation, as it requires no privileges and low attack complexity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart