DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-42080: CVE-2026-42080: Arbitrary File Write and Path Traversal in PPTAgent MCP Server

CVE-2026-42080: Arbitrary File Write and Path Traversal in PPTAgent MCP Server

Vulnerability ID: CVE-2026-42080
CVSS Score: 4.6
Published: 2026-05-05

PPTAgent versions prior to commit 418491a9a1c02d9d93194b5973bb58df35cf9d00 contain a path traversal vulnerability (CWE-22) within the Model Context Protocol (MCP) server's file handling mechanisms. An attacker with low privileges can supply crafted file paths containing traversal sequences to write files or create directories outside the intended workspace boundaries. This results in unauthorized file modification and limited host filesystem exposure.

TL;DR

A path traversal flaw in PPTAgent allows low-privileged attackers to write PowerPoint presentations and image files to arbitrary locations on the host filesystem via unvalidated path inputs.


Technical Details

  • Vulnerability Class: CWE-22: Path Traversal
  • Attack Vector: Network
  • CVSS v3.1 Score: 4.6
  • EPSS Score: 0.00036
  • Impact: Arbitrary File Write / Directory Creation
  • Exploit Status: None
  • CISA KEV: Not Listed

Affected Systems

  • PPTAgent (icip-cas)
  • PPTAgent: < 418491a9a1c02d9d93194b5973bb58df35cf9d00 (Fixed in: 418491a9a1c02d9d93194b5973bb58df35cf9d00)

Code Analysis

Commit: 418491a

Implemented path resolution logic and restricted eval() globals

Mitigation Strategies

  • Update PPTAgent to commit 418491a9a1c02d9d93194b5973bb58df35cf9d00 or later.
  • Run the PPTAgent MCP server with a dedicated, low-privileged user account.
  • Implement mandatory access controls to strictly limit write access to intended workspace directories.

Remediation Steps:

  1. Pull the latest version of the PPTAgent repository containing commit 418491a9a1c02d9d93194b5973bb58df35cf9d00.
  2. Restart the PPTAgent MCP service to apply the updated Python codebase.
  3. Verify the service user account lacks write permissions outside the designated application workspace.

References


Read the full report for CVE-2026-42080 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)