Impact
The vulnerability resides in the read_pdf function of PromptX's Document File Handler, which processes a file path argument without proper validation. This allows an attacker to craft a path that resolves to an absolute location on the server, enabling them to read arbitrary files. The weakness is classified as absolute path traversal (CWE-22) and relative path traversal (CWE-36).
Affected Systems
The affected vendor is Deepractice, product PromptX, versions up to 2.4.0. The vulnerability was identified in the packages/mcp-office/src/index.ts component. Systems running PromptX 2.4.0 or earlier are at risk.
Risk and Exploitability
The CVSS score is 6.9, indicating a medium severity vulnerability. The EPSS score is not available, and the issue has not been listed in CISA KEV. The problem can be leveraged remotely, and the exploit is publicly disclosed, meaning attackers could construct a malicious request to trigger the file traversal. Until a patch is released, this remains a potential risk to confidentiality, as sensitive files could be accessed.
OpenCVE Enrichment