GHSA-r466-rxw4-3j9j: Path Traversal and Arbitrary File Write in Evolver fetch Command
Vulnerability ID: GHSA-R466-RXW4-3J9J
CVSS Score: 8.1
Published: 2026-04-22
The @evomap/evolver npm package prior to version 1.69.3 contains a critical path traversal vulnerability in its fetch command. Unsanitized input passed to the --out command-line flag allows an attacker to escape the intended directory structure and write arbitrary files to any location writable by the Node.js process.
TL;DR
A path traversal flaw in Evolver allows attackers to write arbitrary files to the filesystem by manipulating the --out flag in the fetch command. Upgrading to version 1.69.3 patches the vulnerability.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-22, CWE-73
- Attack Vector: Network / Command Line Manipulation
- CVSS Score: 8.1 (High)
- Impact: Arbitrary File Write, Potential RCE
- Exploit Status: PoC Available
- Patched Version: 1.69.3
Affected Systems
- @evomap/evolver (npm package)
-
@evomap/evolver: < 1.69.3 (Fixed in:
1.69.3)
Exploit Details
- Advisory Details: Proof of Concept demonstrating arbitrary directory creation and file write.
Mitigation Strategies
- Upgrade the
@evomap/evolverpackage to version 1.69.3 or later. - Implement command-line argument validation in execution wrappers to block
../sequences. - Enforce least privilege by running the Node.js application under a restricted user account.
- Deploy the application within a containerized or sandboxed filesystem environment.
Remediation Steps:
- Identify all projects and pipelines utilizing
@evomap/evolver. - Update
package.jsondependencies to require>=1.69.3. - Run
npm installoryarn installto update the lockfiles. - Audit the filesystem for unauthorized modifications if the vulnerability was previously exposed to untrusted input.
References
- GitHub Security Advisory: GHSA-r466-rxw4-3j9j
- EvoMap/evolver Repository
- Evolver Security Updates
- Release v1.69.3
Read the full report for GHSA-R466-RXW4-3J9J on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)