Impact
This flaw allows an attacker to inject a traversal sequence into the checkpoint_dir parameter of the OfflineACE.run function. The underlying save_to_file method does not normalise or validate the supplied path, enabling writes outside the intended directory. This can result in overwriting critical configuration files or binaries, potentially allowing the attacker to corrupt the application or inject malicious code.
Affected Systems
The vulnerable component is the agentic-context-engine project, versions up to 0.7.1. The exact vendor is unspecified but the source code is available for versions 0.0.x through 0.7.1, which may be deployed in various self‑hosted or cloud environments.
Risk and Exploitability
With a CVSS score of 7.6, the issue is considered high severity, and the EPSS score is not reported. The vulnerability is not listed in the CISA KEV catalog, suggesting no public exploit is documented yet. Based on the description, the likely attack vector requires the attacker to interact with the OfflineACE.run entry point, indicating either a local or remote vulnerability depending on deployment. Successful exploitation can grant the attacker arbitrary file writes, leading to privilege escalation, application corruption, or code execution based on the target environment.
OpenCVE Enrichment