Impact
PPTAgent, an agentic framework for reflective PowerPoint generation, contains a flaw in the markdown_table_to_image function that enables an attacker to write arbitrary files and create directories on the local file system. This defect, identified as a pathname traversal and file write vulnerability (CWE‑22), can overwrite existing files, interfere with application behavior, or place malicious content on disk. The description does not indicate that the flaw permits disclosure of existing data, but it allows the attacker to modify or replace files that the agent needs to run properly.
Affected Systems
All deployments of icip‑cas PPTAgent that have not applied commit 418491a are affected. The vulnerability applies to every version using the older markdown_table_to_image routine, regardless of the release date.
Risk and Exploitability
The CVSS score of 4.6 categorizes the issue as low severity. No EPSS data is available, which suggests that there are no public reports of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, possibly through a crafted request to the generating service; the description does not clarify whether remote input can trigger the function, so the risk depends on an attacker’s capacity to invoke this code path.
OpenCVE Enrichment