Impact
The vulnerability resides in the FileManagerTool component of the griptape-ai griptape library, allowing attackers to craft requests that cause the tool to read from or write to files outside of the intended directory. This occurs through manipulation of functions such as load_files_from_disk, list_files_from_disk, save_content_to_file, and save_memory_artifacts_to_disk. The outcome is the potential for an adversary to expose sensitive data or place malicious files, which could later be leveraged for further compromise. The weakness is a classic path traversal flaw, identified by CWE-22, and is observable from a remote context as the exploit can be triggered without local user interaction.
Affected Systems
This issue affects the griptape-ai griptape library, specifically the FileManagerTool component in version 0.19.4. Users who are running this exact version or derive it from the same codebase are susceptible. The scope does not extend to other versions unless they include the same vulnerable functions without proper sanitization.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk; the lack of an available EPSS score means exploit likelihood data is currently unknown. Since the vulnerability can be exploited from outside the host, it poses a significant threat to confidentiality and integrity. While the CVE notes that the exploit has been publicly disclosed and may be used, the specific impact could range from data exposure to arbitrary code execution if the written files can be executed by the application or system. The absence from the CISA KEV catalog suggests it is not a known exploited vulnerability yet, but the potential severity warrants precaution.
OpenCVE Enrichment