Description
Microsoft APM is an open-source, community-driven dependency manager for AI agents. Prior to 0.13.0, Microsoft APM contains a Windows-specific archive extraction boundary failure in the legacy-bundle probe used by apm install <bundle> on supported Python 3.10 and 3.11 runtimes. When apm install is given a local .tar.gz that is not recognized as a plugin-format bundle, APM probes whether it is a legacy --format apm bundle. On Python versions earlier than 3.12, that probe extracts untrusted tar members with raw tar.extractall() without rejecting Windows absolute member names such as D:/.... This vulnerability is fixed in 0.13.0.
Published: 2026-05-15
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Microsoft APM enables community‑driven dependency management for AI agents. Prior to version 0.13.0 it contained a Windows‑specific boundary failure during legacy‑bundle probing. When the install command receives a local .tar.gz that is not recognized as a plugin‑bundle, the legacy probe extracts all tar members with raw tar.extractall() and does not reject absolute Windows member names such as D:/… . The result is that an attacker can supply a crafted archive and overwrite any files for which the user executing apm install has write permission. This can lead to tampering with configuration files, executable binaries, or other critical assets, providing a local file overwrite vector that may allow privilege escalation or persistence.

Affected Systems

The finding applies to Microsoft APM versions prior to 0.13.0 on Windows systems that use Python 3.10 or 3.11. The vulnerability is triggered only when apm install is run against an unrecognized .tar.gz file and the runtime is older than Python 3.12. Users operating on those environments are affected unless they have already upgraded to the fixed release. No other operating systems or Python versions are mentioned as impacted.

Risk and Exploitability

The CVSS score is 5.5, indicating a moderate severity. The EPSS score is not available, so the concrete exploitation probability cannot be quantified from the current data. The issue is not listed in CISA’s KEV catalog. The attack vector is inferred to be local, because the vulnerability is exercised during a local install operation and depends on the user supplying a malicious archive. Distributed or remote exploitation would require an attacker to obtain local execution of apm or to deliver a malicious bundle to a mechanism that automatically installs bundles. Without additional information, the risk is considered moderate for users who run apm install on potentially untrusted archives.

Generated by OpenCVE AI on May 15, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Microsoft APM to version 0.13.0 or later to remove the absolute path extraction flaw
  • Only install bundles from trusted sources; validate the content of any .tar.gz before execution
  • Run apm install under a least‑privilege account or restrict write permissions to sensitive directories

Generated by OpenCVE AI on May 15, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mq5j-pw29-jcv3 Microsoft APM: Windows absolute-path tar member overwrite during legacy-bundle probing in `apm install`
History

Fri, 15 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description Microsoft APM is an open-source, community-driven dependency manager for AI agents. Prior to 0.13.0, Microsoft APM contains a Windows-specific archive extraction boundary failure in the legacy-bundle probe used by apm install <bundle> on supported Python 3.10 and 3.11 runtimes. When apm install is given a local .tar.gz that is not recognized as a plugin-format bundle, APM probes whether it is a legacy --format apm bundle. On Python versions earlier than 3.12, that probe extracts untrusted tar members with raw tar.extractall() without rejecting Windows absolute member names such as D:/.... This vulnerability is fixed in 0.13.0.
Title Microsoft APM: Windows absolute-path tar member overwrite during legacy-bundle probing in `apm install`
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T17:49:11.229Z

Reserved: 2026-05-13T19:53:47.922Z

Link: CVE-2026-46383

cve-icon Vulnrichment

Updated: 2026-05-15T17:48:01.747Z

cve-icon NVD

Status : Received

Published: 2026-05-15T17:16:49.090

Modified: 2026-05-15T19:17:04.220

Link: CVE-2026-46383

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T17:30:04Z

Weaknesses