Platform
python
Component
zhayujie-chatgpt-on-wechat
Fixed in
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
CVE-2026-5998 is a Path Traversal vulnerability affecting zhayujie CowAgent versions 2.0.0 through 2.0.5. This flaw resides within the file agent dispatch functionality, allowing attackers to potentially access sensitive files through manipulation of the filename argument. Successful exploitation can be initiated remotely, and a proof-of-concept is publicly available. Upgrade to version 2.0.5 to resolve this issue.
The Path Traversal vulnerability in CowAgent allows an attacker to bypass intended access controls and read arbitrary files on the system. By crafting a malicious filename, an attacker can traverse directories outside the intended scope, potentially accessing configuration files, source code, or other sensitive data. This could lead to information disclosure, privilege escalation, or even remote code execution if the accessed files contain executable code. The published proof-of-concept significantly lowers the barrier to exploitation, increasing the risk of widespread attacks targeting vulnerable deployments.
A proof-of-concept exploit for CVE-2026-5998 has been publicly released, indicating a moderate to high probability of exploitation. The vulnerability is not currently listed on CISA KEV as of this writing, but its ease of exploitation warrants close monitoring. The vendor responded promptly and released a patch, suggesting awareness of the vulnerability and potential for active exploitation attempts.
Exploit Status
EPSS
0.06% (20% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5998 is to upgrade CowAgent to version 2.0.5, which includes the necessary fix. If an immediate upgrade is not feasible, consider implementing temporary workarounds such as restricting network access to the API Memory Content Endpoint or implementing strict input validation on the filename parameter. WAF rules can be configured to block requests containing suspicious path traversal sequences (e.g., '../'). Review and audit file access permissions to ensure least privilege. After upgrading, confirm the fix by attempting a path traversal attack with a known malicious filename and verifying that access is denied.
Update the chatgpt-on-wechat CowAgent component to version 2.0.5 or higher to mitigate the directory traversal vulnerability. The patched version includes patch 174ee0cafc9e8e9d97a23c305418251485b8aa89.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5998 is a Path Traversal vulnerability in zhayujie CowAgent versions 2.0.0–2.0.5, allowing attackers to access unauthorized files by manipulating the filename argument.
You are affected if you are using CowAgent versions 2.0.0 through 2.0.5 and have not upgraded to version 2.0.5.
Upgrade CowAgent to version 2.0.5. If immediate upgrade is not possible, implement temporary workarounds like restricting network access or input validation.
A proof-of-concept exploit is publicly available, suggesting a moderate to high probability of active exploitation.
Refer to the vendor's advisory and release notes for CowAgent version 2.0.5 for details on the fix and related information.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.