Impact
Prompts.chat suffers from a path traversal flaw in its skill file handling routine, allowing attackers to embed directory traversal sequences in ZIP archive filenames. When the vulnerable extraction tool processes these filenames, it writes files outside the intended directory, including overwriting shell initialization files. This gives an attacker the ability to execute arbitrary code on the client system. The weakness is a classic path traversal issue (CWE-22).
Affected Systems
The vulnerability affects all releases of Prompts.chat from the f:prompts.chat project that were created before the patch identified by commit 0f8d4c381abd7b2d7478c9fdee9522149c2d65e5. Active users running older versions without this commit are at risk.
Risk and Exploitability
The CVSS score of 8.6 classifies it as high severity, and an EPSS score of less than 1% indicates a low probability of exploitation so far, though the capability to achieve remote code execution makes it a critical risk. The vulnerability is not yet listed in the CISA KEV catalog. Exploitation requires the attacker to supply a malicious ZIP file through the skill file upload interface, suggesting the vector is remote and conditional on providing input to the handling function.
OpenCVE Enrichment