Description
A security vulnerability has been detected in Deepractice PromptX up to 2.4.0. The affected element is the function read_docx/read_xlsx/read_pptx/list_xlsx_sheets/read_pdf of the file packages/mcp-office/src/index.ts of the component Document File Handler. Such manipulation of the argument path leads to absolute path traversal. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Access
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the read_pdf function of PromptX's Document File Handler, which processes a file path argument without proper validation. This allows an attacker to craft a path that resolves to an absolute location on the server, enabling them to read arbitrary files. The weakness is classified as absolute path traversal (CWE-22) and relative path traversal (CWE-36).

Affected Systems

The affected vendor is Deepractice, product PromptX, versions up to 2.4.0. The vulnerability was identified in the packages/mcp-office/src/index.ts component. Systems running PromptX 2.4.0 or earlier are at risk.

Risk and Exploitability

The CVSS score is 6.9, indicating a medium severity vulnerability. The EPSS score is not available, and the issue has not been listed in CISA KEV. The problem can be leveraged remotely, and the exploit is publicly disclosed, meaning attackers could construct a malicious request to trigger the file traversal. Until a patch is released, this remains a potential risk to confidentiality, as sensitive files could be accessed.

Generated by OpenCVE AI on April 28, 2026 at 12:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a version of PromptX newer than 2.4.0 once a vendor fix is released.
  • Configure the application or network to block external access to the Document File Handler endpoints until a patch is available.
  • Monitor the PromptX project and known vulnerability feeds for an update or advisory on this issue.

Generated by OpenCVE AI on April 28, 2026 at 12:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Deepractice
Deepractice promptx
Vendors & Products Deepractice
Deepractice promptx

Tue, 28 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Deepractice PromptX up to 2.4.0. The affected element is the function read_docx/read_xlsx/read_pptx/list_xlsx_sheets/read_pdf of the file packages/mcp-office/src/index.ts of the component Document File Handler. Such manipulation of the argument path leads to absolute path traversal. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Deepractice PromptX Document File index.ts read_pdf absolute path traversal
Weaknesses CWE-22
CWE-36
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Deepractice Promptx
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T12:49:55.504Z

Reserved: 2026-04-27T15:24:23.930Z

Link: CVE-2026-7217

cve-icon Vulnrichment

Updated: 2026-04-28T12:49:31.612Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T03:16:04.777

Modified: 2026-04-28T20:31:00.800

Link: CVE-2026-7217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T12:45:31Z

Weaknesses