Description
A security flaw has been discovered in frdel/agent0ai agent-zero 0.9.7-10. The impacted element is the function get_abs_path of the file python/helpers/files.py. The manipulation results in path traversal. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal
Action: Immediate Patch
AI Analysis

Impact

A path traversal vulnerability has been discovered in the get_abs_path function of the python/helpers/files.py module of agent-zero 0.9.7-10. The faulty handling of path components allows an attacker to craft a request that resolves to a directory outside the intended sandbox, enabling the read or modification of arbitrary files on the host. The flaw provides potential for attackers to gain unauthorized access to sensitive configuration files, credentials, or other data, thereby exposing confidentiality and possibly integrity of the system. Key weakness identified: CWE-22.

Affected Systems

The vulnerability affects agent-zero versions 0.9.7-10 from the vendors agent0ai and frdel. No patch or update is listed in the provided data; affected users are urged to verify with the vendors for any fixes or new releases.

Risk and Exploitability

The CVSS score for this issue is 5.3, indicating a medium impact potential. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. The description explicitly states that the attack can be executed remotely, which allows a remote attacker to construct a malicious request and exploit the path traversal without requiring local privileges. The presence of an publicly released exploit increases the likelihood that adversaries may attempt to use this vulnerability in the wild.

Generated by OpenCVE AI on March 17, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available patch for agent-zero 0.9.7-10 to address the path traversal issue.
  • Restrict file permissions for directories accessed by get_abs_path to limit exposure.
  • Monitor application logs for suspicious file access patterns and investigate any anomalies.

Generated by OpenCVE AI on March 17, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in frdel/agent0ai agent-zero 0.9.7-10. The impacted element is the function get_abs_path of the file python/helpers/files.py. The manipulation results in path traversal. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title frdel/agent0ai agent-zero files.py get_abs_path path traversal
First Time appeared Agent-zero
Agent-zero agent-zero
Weaknesses CWE-22
CPEs cpe:2.3:a:agent-zero:agent-zero:*:*:*:*:*:*:*:*
Vendors & Products Agent-zero
Agent-zero agent-zero
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Agent-zero Agent-zero
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T13:25:49.019Z

Reserved: 2026-03-16T21:31:48.889Z

Link: CVE-2026-4307

cve-icon Vulnrichment

Updated: 2026-03-17T13:25:44.234Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-17T04:16:22.377

Modified: 2026-03-17T14:20:01.670

Link: CVE-2026-4307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:36Z

Weaknesses