Description
A weakness has been identified in OpenBMB XAgent 1.0.0. Affected by this vulnerability is the function workspace of the file XAgentServer/application/routers/workspace.py. This manipulation of the argument file_name causes path traversal. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-11
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Directory Traversal (Remote)
Action: Apply patch
AI Analysis

Impact

OpenBMB XAgent 1.0.0 contains a flaw in the workspace function of workspace.py. The function blindly processes the file_name argument, allowing an attacker to craft a path that traverses outside the intended workspace directory. This leads to directory traversal, which can expose sensitive files or system configuration data. The weakness is classified as CWE-22, a common path traversal vulnerability.

Affected Systems

The affected product is OpenBMB XAgent, specifically version 1.0.0. No extended version matrix was provided by the CNA. Users running this version or newer unpatched variants are at risk.

Risk and Exploitability

The CVSS score of 6.9 indicates a high impact severity. The EPSS score is below 1%, showing low current exploit probability, and the vulnerability is not listed in the CISA KEV catalog. However, the vulnerability is publicly available and can be remotely triggered by manipulating the file_name argument, making it potentially exploitable by adversaries with network access to the service. The overall risk is moderate to high, particularly for environments exposed to the internet without hardened input validation.

Generated by OpenCVE AI on March 17, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenBMB XAgent to a version that removes the path traversal flaw (if available).
  • If no patch exists, modify the workspace function to sanitize or whitelist file_name inputs, rejecting any traversal sequences such as ".." or absolute paths.
  • Restrict the workspace directory to a protected, non-privileged location to limit potential damage.
  • Apply network segmentation or firewall rules to limit exposure of the XAgent service to trusted hosts.

Generated by OpenCVE AI on March 17, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in OpenBMB XAgent 1.0.0. Affected by this vulnerability is the function workspace of the file XAgentServer/application/routers/workspace.py. This manipulation of the argument file_name causes path traversal. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Title OpenBMB XAgent workspace.py workspace path traversal
First Time appeared Openbmb
Openbmb xagent
Weaknesses CWE-22
CPEs cpe:2.3:a:openbmb:xagent:*:*:*:*:*:*:*:*
Vendors & Products Openbmb
Openbmb xagent
References
Metrics cvssV2_0

{'score': 6.4, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T19:51:41.759Z

Reserved: 2026-03-11T12:27:50.953Z

Link: CVE-2026-3954

cve-icon Vulnrichment

Updated: 2026-03-12T19:51:39.006Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T20:16:23.477

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-3954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:37:24Z

Weaknesses