Description
ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed. Attackers can supply traversal-style values or absolute paths as the agent name to influence directory creation and write files outside the intended custom-agent directory, potentially achieving arbitrary file write on the system subject to filesystem permissions.
Published: 2026-04-17
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Apply Patch
AI Analysis

Impact

ByteDance DeerFlow contains a path traversal vulnerability in bootstrap‑mode custom‑agent creation. When creating an agent, the agent name is used without proper validation, allowing attackers to supply traversal sequences or absolute paths. This causes the application to create directories and write files outside the intended custom‑agent directory. Depending on the file type and the underlying filesystem permissions, the attacker could overwrite configuration files, place malicious binaries, or otherwise tamper with system state, potentially leading to arbitrary code execution or other privilege escalation.

Affected Systems

ByteDance DeerFlow before commit 2176b2b of the source repository is affected. The vulnerability applies to any deployment that uses the bootstrap‑mode custom‑agent creation before the code change that enforces proper validation.

Risk and Exploitability

The CVSS score of 7.1 classifies the issue as a Medium severity vulnerability. EPSS data is not available, and the vulnerability is not listed in CISA KEV. The likely attack vector is via bootstrap‑mode access, which may be provided through a web API or management interface; exploitation requires the attacker to have the ability to submit agent creation requests. If the underlying file system permissions grant write access to the attacker’s user, the vulnerability could be used to modify or create arbitrary files, potentially enabling further attacks such as privilege escalation or remote code execution.

Generated by OpenCVE AI on April 18, 2026 at 17:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the code change in commit 2176b2b or later to enforce proper validation of agent names.
  • If upgrading immediately is not possible, restrict access to bootstrap‑mode and enforce the least‑privilege principle on the file system directories used by DeerFlow so that the application cannot write outside the intended location.
  • Implement validation or a whitelist for agent names to prevent traversal characters before the agent is created.

Generated by OpenCVE AI on April 18, 2026 at 17:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Bytedance
Bytedance deer-flow
Vendors & Products Bytedance
Bytedance deer-flow

Fri, 17 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed. Attackers can supply traversal-style values or absolute paths as the agent name to influence directory creation and write files outside the intended custom-agent directory, potentially achieving arbitrary file write on the system subject to filesystem permissions.
Title ByteDance DeerFlow Path Traversal and Arbitrary File Write via Bootstrap Mode
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Bytedance Deer-flow
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-17T18:35:51.128Z

Reserved: 2026-04-13T20:29:02.809Z

Link: CVE-2026-40518

cve-icon Vulnrichment

Updated: 2026-04-17T18:35:46.688Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-17T17:17:09.543

Modified: 2026-04-17T19:01:56.030

Link: CVE-2026-40518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:15:05Z

Weaknesses