Plattform
nodejs
Komponente
prompts-chat
Behoben in
0f8d4c381abd7b2d7478c9fdee9522149c2d65e5
CVE-2026-22661 describes a Path Traversal vulnerability discovered in prompts.chat, a Node.js application. This flaw allows attackers to write arbitrary files to the client system by exploiting insufficient filename validation during skill file handling. Affected versions are those prior to commit 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5. A fix is available in version 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5.
The core of this vulnerability lies in the inadequate sanitization of filenames within ZIP archives when prompts.chat processes skill files. An attacker can leverage this by creating a specially crafted ZIP archive where filenames contain path traversal sequences like ../. When the application extracts these archives, it will write files outside the intended directory, potentially overwriting critical system files. Successful exploitation could lead to arbitrary code execution on the client machine, granting the attacker significant control over the affected system. This could include installing malware, stealing sensitive data, or disrupting system operations. The ability to overwrite shell initialization files is particularly concerning, as it could allow for persistent code execution across user sessions.
This vulnerability was publicly disclosed on 2026-04-03. There are currently no known public proof-of-concept exploits available, but the vulnerability's nature and potential impact suggest it could become a target for exploitation. It is not currently listed on the CISA KEV catalog. The ease of crafting malicious ZIP archives makes this vulnerability potentially attractive to attackers with moderate skill levels.
Users of prompts.chat who are accepting skill files from untrusted sources are at significant risk. This includes developers integrating prompts.chat into their applications and users who are deploying prompts.chat in environments where they cannot fully control the input data. Shared hosting environments where multiple users share the same server are also particularly vulnerable.
• nodejs / server:
find /path/to/prompts.chat/skill_files -name '*[./\*]' -print• nodejs / server:
ps aux | grep prompts.chat | grep -i 'skill_files'• generic web: Inspect server logs for unusual file access patterns or errors related to ZIP archive extraction. • generic web: Check for unexpected files in the application's skill file directory.
disclosure
Exploit-Status
EPSS
0.03% (10% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-22661 is to immediately upgrade prompts.chat to version 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5, which contains the fix. If upgrading is not immediately feasible, consider implementing stricter input validation on all uploaded ZIP archives, specifically filtering out path traversal sequences. Employing a Web Application Firewall (WAF) with rules to block requests containing suspicious filenames can also provide an additional layer of defense. Regularly scan your system for any unexpected files or modifications in sensitive directories. After upgrading, confirm the fix by attempting to upload a test ZIP archive containing a path traversal sequence and verifying that the file is not written outside the intended directory.
Actualice a la versión 0.0.0 o posterior, que corrige la vulnerabilidad de recorrido de ruta. Esto implica actualizar el paquete 'prompts.chat' a la última versión disponible en el repositorio de GitHub.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-22661 is a Path Traversal vulnerability in prompts.chat allowing attackers to write arbitrary files, potentially leading to code execution. It affects versions prior to 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5.
You are affected if you are using prompts.chat versions 0.0.0–0f8d4c381abd7b2d7478c9fdee9522149c2d65e5 and accept skill files from untrusted sources.
Upgrade to version 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5 or implement strict filename validation on the server-side.
There is currently no indication that CVE-2026-22661 is being actively exploited.
Refer to the prompts.chat project repository for the latest security advisories and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.