Impact
The safe_join() function in AGiXT’s essential_abilities extension does not enforce that resolved file paths remain inside the intended agent workspace. An authenticated attacker can exploit directory traversal sequences to read, write, or delete arbitrary files on the server that hosts the AGiXT instance. This weakness allows an attacker to compromise confidentiality and integrity of files and, if deletion is performed, disrupt availability. The issue is categorized as a Path Traversal flaw (CWE‑22).
Affected Systems
Vendor Josh‑XT produces the AGiXT platform. All releases older than version 1.9.2 contain the flaw; the vulnerability was fixed in AGiXT v1.9.2. Installations running 1.9.1 or earlier are at risk and should be updated.
Risk and Exploitability
The CVSS score of 8.8 signals high severity. The vulnerability requires that the attacker first authenticate to the AGiXT instance; once authenticated, the attacker can traverse directories and manipulate files across the host. EPSS data is not available, and the vulnerability is not yet listed in the CISA KEV catalog. Nevertheless, given the high severity and the nature of the flaw, the potential for serious impact exists if an attacker gains authenticated access.
OpenCVE Enrichment
Github GHSA