CVE-2026-39981

HIGH

AGiXT has a Path Traversal in safe_join()

Title source: cna

Description

AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. This vulnerability is fixed in 1.9.2.

Scores

CVSS v3 8.8
EPSS 0.0054
EPSS Percentile 67.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (2)
Josh-XT/AGiXT < 1.9.2
pypi/agixt 0 - 1.9.2PyPI
Published Apr 09, 2026
Tracked Since Apr 09, 2026