Impact
An exploit in the PowerPoint generation framework allows an attacker to write arbitrary files through the function that saves generated slides. The weakness involves improper validation of file paths, enabling overwrite of any file the process can access. This flaw permits persistence of attacker-controlled code or configurations on the local machine where the agent runs, potentially compromising system integrity and confidentiality.
Affected Systems
The flaw resides in the icip-cas PPTAgent platform. No specific affected version numbers are listed, but the patch introducing the fix is present in commit 418491a. Until a patched version is deployed, all instances of PPTAgent running before that commit are vulnerable.
Risk and Exploitability
The vulnerability receives a CVSS score of 4.6, indicating medium severity and a moderate level of risk. EPSS data is not available, so the probability of exploitation cannot be quantified. It is not featured in the CISA KEV catalog, suggesting no known widespread exploitation. The attack likely requires execution of the function, which could be triggered by local users or code already running with sufficient privileges. The lack of a publicly documented exploit path means that successful exploitation would depend on an attacker being able to influence the input to the save function or coerce the agent into running a malicious payload.
OpenCVE Enrichment