Description
PPTAgent is an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, there is an arbitrary file write vulnerability via `save_generated_slides`. This issue has been patched via commit 418491a.
Published: 2026-05-04
Score: 4.6 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An exploit in the PowerPoint generation framework allows an attacker to write arbitrary files through the function that saves generated slides. The weakness involves improper validation of file paths, enabling overwrite of any file the process can access. This flaw permits persistence of attacker-controlled code or configurations on the local machine where the agent runs, potentially compromising system integrity and confidentiality.

Affected Systems

The flaw resides in the icip-cas PPTAgent platform. No specific affected version numbers are listed, but the patch introducing the fix is present in commit 418491a. Until a patched version is deployed, all instances of PPTAgent running before that commit are vulnerable.

Risk and Exploitability

The vulnerability receives a CVSS score of 4.6, indicating medium severity and a moderate level of risk. EPSS data is not available, so the probability of exploitation cannot be quantified. It is not featured in the CISA KEV catalog, suggesting no known widespread exploitation. The attack likely requires execution of the function, which could be triggered by local users or code already running with sufficient privileges. The lack of a publicly documented exploit path means that successful exploitation would depend on an attacker being able to influence the input to the save function or coerce the agent into running a malicious payload.

Generated by OpenCVE AI on May 4, 2026 at 19:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PPTAgent to include commit 418491a, which implements proper path validation for generated slides
  • Configure the agent to enforce a strict directory whitelist for output files, rejecting paths that do not reside within the designated slides directory
  • Implement regular monitoring of file creation events by PPTAgent, and audit logs for unexpected file writes to detect abuse of the write capability

Generated by OpenCVE AI on May 4, 2026 at 19:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Icip-cas
Icip-cas pptagent
Vendors & Products Icip-cas
Icip-cas pptagent

Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description PPTAgent is an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, there is an arbitrary file write vulnerability via `save_generated_slides`. This issue has been patched via commit 418491a.
Title PPTAgent: Arbitrary File Write via `save_generated_slides`
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

Icip-cas Pptagent
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-04T16:58:36.414Z

Reserved: 2026-04-23T19:17:30.565Z

Link: CVE-2026-42080

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:25.037

Modified: 2026-05-04T17:16:25.037

Link: CVE-2026-42080

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:43:56Z

Weaknesses