Impact
The flaw resides in the dispatch routine of the API Memory Content Endpoint in CowAgent, where an attacker can manipulate the filename argument to perform directory traversal. This vulnerability can enable an adversary to read arbitrary files on the host and, in some contexts, execute code if executable files can be accessed, as classified under CWE-22. The associated CVSS score of 6.9 indicates a moderate to high severity for confidentiality, integrity, and availability concerns.
Affected Systems
This issue affects zhayujie chatgpt‑on‑wechat CowAgent versions up to and including 2.0.4. Versions 2.0.5 and later contain the vendor‑supplied fix (commit 174ee0cafc9e8e9d97a23c305418251485b8aa89). The vulnerability was publicly disclosed via GitHub commits and issue discussions, making it readily available to attackers using the exposed API endpoint.
Risk and Exploitability
The CVSS rating signals that an attacker can read arbitrary files with moderate effort. Although no EPSS score is reported, the existence of a published exploit and the remote nature of the attack vector increase the risk. The CVE is not listed in the CISA KEV catalog, suggesting it is not yet a widespread or highly publicized attack, yet the presence of an actively discussed exploit on open‑source platforms warrants vigilance. Remote exploitation is achievable by sending a crafted request to the vulnerable endpoint, requiring only network access to the service.
OpenCVE Enrichment