Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xhrw-5qxx-jpwr | Microsoft APM CLI's plugin.json component paths escape plugin root and copy arbitrary host files during install |
Fri, 15 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Microsoft APM is an open-source, community-driven dependency manager for AI agents. Prior to 0.8.12, Microsoft APM normalizes marketplace plugins by copying plugin components referenced in plugin.json into .apm/. The manifest fields agents, skills, commands, and hooks are attacker-controlled, but the implementation does not enforce that those paths remain inside the plugin directory. A malicious plugin can therefore use absolute paths or ../ traversal paths to copy arbitrary readable host files or directories from the installer's machine during apm install. This vulnerability is fixed in 0.8.12. | |
| Title | Microsoft APM: plugin.json component paths escape plugin root and copy arbitrary host files during install | |
| Weaknesses | CWE-22 CWE-73 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T17:49:00.985Z
Reserved: 2026-05-07T15:30:10.875Z
Link: CVE-2026-44641
Updated: 2026-05-15T17:48:55.309Z
Status : Received
Published: 2026-05-15T17:16:47.633
Modified: 2026-05-15T19:17:00.220
Link: CVE-2026-44641
No data.
OpenCVE Enrichment
Updated: 2026-05-15T18:00:05Z
Github GHSA