Home

Description

prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path traversal sequences. Attackers can exploit missing server-side filename validation to inject path traversal sequences ../ into skill file archives, which when extracted by vulnerable tools write files outside the intended directory and overwrite shell initialization files to achieve code execution.

PUBLISHED Reserved 2026-01-08 | Published 2026-04-03 | Updated 2026-04-06 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5
affected

Credits

Mehmet Ince @mdisec finder

References

github.com/f/prompts.chat/pull/1101 issue-tracking

github.com/...ommit/0f8d4c381abd7b2d7478c9fdee9522149c2d65e5 patch

www.vulncheck.com/...-path-traversal-via-skill-file-handling third-party-advisory

cve.org (CVE-2026-22661)

nvd.nist.gov (CVE-2026-22661)

Download JSON