-
CVSS Score
-Both functions in the Flask routes /save-workflow and /load-workflow directly use user-supplied 'filename' parameters to construct file paths using os.path.join() without validating against path traversal sequences. This allows attackers to use relative paths (e.g., '../../sensitive.json') to access files outside the intended user_dir directory. The vulnerability is confirmed by the CWE-22/CWE-23 classifications and matches the described attack pattern of reading/writing arbitrary JSON files.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| agentscope | pip |
Ongoing coverage of React2Shell