Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bytedance
Bytedance deer-flow |
|
| Vendors & Products |
Bytedance
Bytedance deer-flow |
Fri, 17 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed. Attackers can supply traversal-style values or absolute paths as the agent name to influence directory creation and write files outside the intended custom-agent directory, potentially achieving arbitrary file write on the system subject to filesystem permissions. | |
| Title | ByteDance DeerFlow Path Traversal and Arbitrary File Write via Bootstrap Mode | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-17T18:35:51.128Z
Reserved: 2026-04-13T20:29:02.809Z
Link: CVE-2026-40518
Updated: 2026-04-17T18:35:46.688Z
Status : Awaiting Analysis
Published: 2026-04-17T17:17:09.543
Modified: 2026-04-17T19:01:56.030
Link: CVE-2026-40518
No data.
OpenCVE Enrichment
Updated: 2026-04-18T17:15:05Z