CVE-2026-42075
Received Received - Intake
Path Traversal in Evolver AI Agent Engine

Publication date: 2026-05-04

Last updated on: 2026-05-04

Assigner: GitHub, Inc.

Description
Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a path traversal vulnerability in the skill download (fetch) command allows attackers to write files to arbitrary locations on the filesystem. The --out= flag accepts user-provided paths without validation, enabling directory traversal attacks that can overwrite critical system files or create files in sensitive location. This issue has been patched in version 1.69.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in Evolver, a GEP-powered self-evolving engine for AI agents, specifically in versions prior to 1.69.3. It is a path traversal vulnerability in the skill download (fetch) command. The issue arises because the --out= flag accepts user-provided file paths without proper validation, allowing attackers to perform directory traversal attacks. This means attackers can write files to arbitrary locations on the filesystem, potentially overwriting critical system files or creating files in sensitive locations.


How can this vulnerability impact me? :

This vulnerability can have a significant impact by allowing attackers to write or overwrite files anywhere on the filesystem. This can lead to the corruption or replacement of critical system files, potentially causing system instability, unauthorized code execution, or denial of service. Because the attacker can place files in sensitive locations, it may also facilitate further attacks or persistence on the affected system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Evolver to version 1.69.3 or later, where the path traversal issue in the skill download (fetch) command has been patched.

Avoid using the --out= flag with untrusted input to prevent directory traversal attacks that could overwrite critical system files or create files in sensitive locations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart