Description
Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a path traversal vulnerability in the skill download (fetch) command allows attackers to write files to arbitrary locations on the filesystem. The --out= flag accepts user-provided paths without validation, enabling directory traversal attacks that can overwrite critical system files or create files in sensitive location. This issue has been patched in version 1.69.3.
Published: 2026-05-04
Score: 8.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Evolver includes a skill download (fetch) command that accepts a user-controlled "--out" flag. The flag is used to specify an output file path, but the application fails to validate or canonicalise the supplied path. As a result, an attacker can supply a path containing traversal sequences such as "../". This flaw directly maps to CWE-22 (Path Traversal) and allows the writing of files to any location on the filesystem that the Evolver process can access. Overwriting critical system files or creating files in sensitive directories could lead to privilege escalation or compromise of the underlying host.

Affected Systems

The vulnerability affects the Evolver engine distributed by EvoMap. Any installation of evolver that is older than version 1.69.3 is susceptible. The product is known as Evolver by EvoMap, and the unpatched versions include 1.69.2 and earlier releases.

Risk and Exploitability

The CVSS score of 8.1 classifies this issue as High severity, indicating that the flaw can have a substantial impact on confidentiality, integrity, and availability. The EPSS score is not available, so current exploitation likelihood data is lacking, but the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector, as inferred from the exploitation path described in the advisory, is local or remote execution of the fetch command with a crafted --out parameter. If an attacker can run the command with sufficient privileges, the path traversal allows arbitrary files to be written, enabling further compromise.

Generated by OpenCVE AI on May 4, 2026 at 19:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Evolver to version 1.69.3 or later to apply the vendor fix for the path traversal flaw.
  • Configure file system permissions so that the user under which Evolver runs cannot write to critical or sensitive directories.
  • If the skill download feature is not required, disable or remove it from the production environment.

Generated by OpenCVE AI on May 4, 2026 at 19:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Evomap
Evomap evolver
Vendors & Products Evomap
Evomap evolver

Mon, 04 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a path traversal vulnerability in the skill download (fetch) command allows attackers to write files to arbitrary locations on the filesystem. The --out= flag accepts user-provided paths without validation, enabling directory traversal attacks that can overwrite critical system files or create files in sensitive location. This issue has been patched in version 1.69.3.
Title Evolver: Path Traversal via `--out` flag in `fetch` command allows Arbitrary File Write
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-04T17:15:13.381Z

Reserved: 2026-04-23T19:17:30.565Z

Link: CVE-2026-42075

cve-icon Vulnrichment

Updated: 2026-05-04T17:15:10.300Z

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:24.283

Modified: 2026-05-04T18:16:30.240

Link: CVE-2026-42075

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:44:02Z

Weaknesses