Impact
Microsoft APM allows symbolic links placed under the .apm/prompts/ or .apm/agents/ directories of a dependency to be resolved during apm install, causing host‑local files to be copied into the project tree. This provides an attacker the ability to read arbitrary files from the host machine, exposing sensitive data or source code. The flaw is a combination of information disclosure (CWE‑200) and path traversal (CWE‑59).
Affected Systems
Microsoft APM (apm-cli) versions 0.5.4 through 0.12.4 are affected; the issue is fixed in version 0.13.0.
Risk and Exploitability
The CVSS score of 7.4 denotes a High severity vulnerability. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit this by supplying a malicious dependency containing symlinks that point to sensitive host files and then executing apm install, which may happen in local developer workstations or CI pipelines. The impact is primarily confidentiality breach rather than code execution.
OpenCVE Enrichment