Description
Skill Scanner is a security scanner for AI Agent Skills that detects prompt injection, data exfiltration, and malicious code patterns. A vulnerability in the API Server of Skill Scanner could allow a unauthenticated, remote attacker to interact with the server API and either trigger a denial of service (DoS) condition or upload arbitrary files. This vulnerability is due to an erroneous binding to multiple interfaces. An attacker could exploit this vulnerability by sending API requests to a device exposing the affected API Server. A successful exploit could allow the attacker to consume an excessive amount of resources (memory starvation) or to upload files to arbitrary folders on the affected device. This vulnerability affects Skill-scanner 1.0.1 and earlier releases when the API Server is enabled. The API Server is not enabled by default. Skill-scanner software releases 1.0.2 and later contain the fix for this vulnerability.
Published: 2026-02-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service and Arbitrary File Upload
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the API Server of Skill Scanner, caused by an erroneous binding to multiple network interfaces. An unauthenticated, remote attacker can send API requests to the exposed server. Successful exploitation can trigger a denial of service by exhausting memory resources or enable the attacker to upload arbitrary files to any folder on the device. This can compromise data integrity and availability.

Affected Systems

The affected product is Cisco AI Defense’s Skill Scanner, versions 1.0.1 and earlier when the API Server is enabled. The API Server is not enabled by default, but when it is active the vulnerability exists. Version 1.0.2 and later contain the fix.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, while the EPSS score of less than 1% suggests a low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Attackers likely rely on network access to the device; no authentication is required to issue the API calls that trigger the resource exhaustion or file upload. Because the flaw is straightforward, an attacker could potentially exploit it in a production environment if the API Server remains exposed over the network.

Generated by OpenCVE AI on April 17, 2026 at 17:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Skill Scanner to version 1.0.2 or later to apply the vendor patch.
  • If the API Server is not required, disable it to eliminate the exposed interface.
  • Restrict network access to the API Server using firewalls or network segmentation to prevent unauthenticated remote communications.

Generated by OpenCVE AI on April 17, 2026 at 17:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ppfx-73j5-fhxc Skill-scanner Unsecured Network Binding Vulnerability
History

Thu, 26 Feb 2026 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco skill Scanner
CPEs cpe:2.3:a:cisco:skill_scanner:*:*:*:*:*:python:*:*
Vendors & Products Cisco
Cisco skill Scanner

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco-ai-defense
Cisco-ai-defense skill-scanner
Vendors & Products Cisco-ai-defense
Cisco-ai-defense skill-scanner

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description Skill Scanner is a security scanner for AI Agent Skills that detects prompt injection, data exfiltration, and malicious code patterns. A vulnerability in the API Server of Skill Scanner could allow a unauthenticated, remote attacker to interact with the server API and either trigger a denial of service (DoS) condition or upload arbitrary files. This vulnerability is due to an erroneous binding to multiple interfaces. An attacker could exploit this vulnerability by sending API requests to a device exposing the affected API Server. A successful exploit could allow the attacker to consume an excessive amount of resources (memory starvation) or to upload files to arbitrary folders on the affected device. This vulnerability affects Skill-scanner 1.0.1 and earlier releases when the API Server is enabled. The API Server is not enabled by default. Skill-scanner software releases 1.0.2 and later contain the fix for this vulnerability.
Title Skill Scanner Unsecured Network Binding Vulnerability
Weaknesses CWE-668
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Cisco Skill Scanner
Cisco-ai-defense Skill-scanner
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T21:24:08.529Z

Reserved: 2026-02-10T18:01:31.899Z

Link: CVE-2026-26057

cve-icon Vulnrichment

Updated: 2026-02-19T20:58:53.149Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T19:22:29.537

Modified: 2026-02-26T02:56:08.307

Link: CVE-2026-26057

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:00:12Z

Weaknesses