Home

Description

Microsoft APM is an open-source, community-driven dependency manager for AI agents. Prior to 0.8.12, Microsoft APM normalizes marketplace plugins by copying plugin components referenced in plugin.json into .apm/. The manifest fields agents, skills, commands, and hooks are attacker-controlled, but the implementation does not enforce that those paths remain inside the plugin directory. A malicious plugin can therefore use absolute paths or ../ traversal paths to copy arbitrary readable host files or directories from the installer's machine during apm install. This vulnerability is fixed in 0.8.12.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73: External Control of File Name or Path

Product status

< 0.8.12
affected

References

github.com/...ft/apm/security/advisories/GHSA-xhrw-5qxx-jpwr exploit

github.com/...ft/apm/security/advisories/GHSA-xhrw-5qxx-jpwr

cve.org (CVE-2026-44641)

nvd.nist.gov (CVE-2026-44641)

Download JSON