CVE-2026-42078
Arbitrary File Write in PPTAgent via Markdown Table Conversion
Publication date: 2026-05-04
Last updated on: 2026-05-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in PPTAgent involves the ability for an attacker to perform arbitrary file writes and create directories through the markdown_table_to_image functionality. This means that before a specific patch (commit 418491a), an attacker could exploit this flaw to write files or create directories on the system where PPTAgent is running.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with some level of access (since the CVSS vector includes PR:L and UI:R) to write files or create directories arbitrarily. This could lead to limited integrity and availability issues on the affected system, such as overwriting important files or filling storage with unwanted data.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability in PPTAgent related to arbitrary file write and directory creation via markdown_table_to_image has been patched in commit 418491a.
To mitigate this vulnerability, you should update PPTAgent to include the fix from commit 418491a.