Impact
The vulnerability in ErlichLiu claude-agent-sdk-master allows an attacker to manipulate the outputFile argument in the route located at app/api/agent-output/route.ts, resulting in path traversal. This flaw can lead to unauthorized reading or writing of arbitrary files on the server, exposing sensitive configuration or source code files. The weakness is identified as CWE-22, indicating improper validation of file paths.
Affected Systems
The affected product is ErlichLiu's claude-agent-sdk-master. No precise version information is available beyond a commit identifier (b185aa7ff0d864581257008077b4010fca1747bf); however, any release prior to a discovered fix is potentially vulnerable due to the repository's rolling‑release model. Users should therefore treat all current releases as at risk until an update is issued.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate severity, and the EPSS score is not available, meaning current exploit probability data are unknown. The attack may be initiated remotely, as stated in the description. Based on the description, it is inferred that no authentication is required to manipulate the outputFile parameter, allowing path traversal. Because the exploit has already been publicly disclosed, the risk of exploitation is tangible if no mitigation is applied.
OpenCVE Enrichment