CVE-2026-42075
Path Traversal in Evolver AI Agent Engine
Publication date: 2026-05-04
Last updated on: 2026-05-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in Evolver, a GEP-powered self-evolving engine for AI agents, specifically in versions prior to 1.69.3. It is a path traversal vulnerability in the skill download (fetch) command. The issue arises because the --out= flag accepts user-provided file paths without proper validation, allowing attackers to perform directory traversal attacks. This means attackers can write files to arbitrary locations on the filesystem, potentially overwriting critical system files or creating files in sensitive locations.
How can this vulnerability impact me? :
This vulnerability can have a significant impact by allowing attackers to write or overwrite files anywhere on the filesystem. This can lead to the corruption or replacement of critical system files, potentially causing system instability, unauthorized code execution, or denial of service. Because the attacker can place files in sensitive locations, it may also facilitate further attacks or persistence on the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Evolver to version 1.69.3 or later, where the path traversal issue in the skill download (fetch) command has been patched.
Avoid using the --out= flag with untrusted input to prevent directory traversal attacks that could overwrite critical system files or create files in sensitive locations.