CVE-2026-42080: Arbitrary File Write and Path Traversal in PPTAgent MCP Server
Vulnerability ID: CVE-2026-42080
CVSS Score: 4.6
Published: 2026-05-05
PPTAgent versions prior to commit 418491a9a1c02d9d93194b5973bb58df35cf9d00 contain a path traversal vulnerability (CWE-22) within the Model Context Protocol (MCP) server's file handling mechanisms. An attacker with low privileges can supply crafted file paths containing traversal sequences to write files or create directories outside the intended workspace boundaries. This results in unauthorized file modification and limited host filesystem exposure.
TL;DR
A path traversal flaw in PPTAgent allows low-privileged attackers to write PowerPoint presentations and image files to arbitrary locations on the host filesystem via unvalidated path inputs.
Technical Details
- Vulnerability Class: CWE-22: Path Traversal
- Attack Vector: Network
- CVSS v3.1 Score: 4.6
- EPSS Score: 0.00036
- Impact: Arbitrary File Write / Directory Creation
- Exploit Status: None
- CISA KEV: Not Listed
Affected Systems
- PPTAgent (icip-cas)
-
PPTAgent: < 418491a9a1c02d9d93194b5973bb58df35cf9d00 (Fixed in:
418491a9a1c02d9d93194b5973bb58df35cf9d00)
Code Analysis
Commit: 418491a
Implemented path resolution logic and restricted eval() globals
Mitigation Strategies
- Update PPTAgent to commit 418491a9a1c02d9d93194b5973bb58df35cf9d00 or later.
- Run the PPTAgent MCP server with a dedicated, low-privileged user account.
- Implement mandatory access controls to strictly limit write access to intended workspace directories.
Remediation Steps:
- Pull the latest version of the PPTAgent repository containing commit 418491a9a1c02d9d93194b5973bb58df35cf9d00.
- Restart the PPTAgent MCP service to apply the updated Python codebase.
- Verify the service user account lacks write permissions outside the designated application workspace.
References
- NVD Vulnerability Detail - CVE-2026-42080
- GitHub Security Advisory GHSA-pxhg-7xr2-w7xg
- Patch Commit 418491a9a1c02d9d93194b5973bb58df35cf9d00
Read the full report for CVE-2026-42080 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)