Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5gfj-64gh-mgmw | AGiXT Vulnerable to Path Traversal in safe_join() |
Wed, 13 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agixt
Agixt agixt |
|
| CPEs | cpe:2.3:a:agixt:agixt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Agixt
Agixt agixt |
Mon, 13 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Josh-xt
Josh-xt agixt |
|
| Vendors & Products |
Josh-xt
Josh-xt agixt |
Thu, 09 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. This vulnerability is fixed in 1.9.2. | |
| Title | AGiXT has a Path Traversal in safe_join() | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-13T20:10:13.881Z
Reserved: 2026-04-08T00:01:47.628Z
Link: CVE-2026-39981
Updated: 2026-04-13T20:10:09.959Z
Status : Analyzed
Published: 2026-04-09T18:17:02.350
Modified: 2026-05-13T15:52:11.150
Link: CVE-2026-39981
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:32:02Z
Github GHSA