Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in microsoft semantic-kernel

0
Critical
VulnerabilityCVE-2026-25592cvecve-2026-25592cwe-22
Published: Fri Feb 06 2026 (02/06/2026, 20:38:28 UTC)
Source: CVE Database V5
Vendor/Project: microsoft
Product: semantic-kernel

Description

CVE-2026-25592 is a critical path traversal vulnerability in Microsoft Semantic Kernel . NET SDK versions prior to 1. 70. 0, specifically in the SessionsPythonPlugin. It allows an attacker with limited privileges to perform arbitrary file write operations by manipulating file path arguments passed to DownloadFileAsync or UploadFileAsync methods. This vulnerability can lead to full compromise of confidentiality, integrity, and availability of affected systems without requiring user interaction. Microsoft has fixed the issue in version 1. 70. 0, and users are advised to implement function invocation filters to validate file paths as a mitigation. The vulnerability has a CVSS score of 10, indicating maximum severity.

AI-Powered Analysis

AILast updated: 02/06/2026, 21:14:32 UTC

Technical Analysis

CVE-2026-25592 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, also known as Path Traversal) affecting Microsoft’s Semantic Kernel .NET SDK versions earlier than 1.70.0. Semantic Kernel is a software development kit designed to build, orchestrate, and deploy AI agents and multi-agent systems. The vulnerability resides specifically in the SessionsPythonPlugin component, where the methods DownloadFileAsync and UploadFileAsync improperly validate the localFilePath argument. An attacker with limited privileges (PR:L) can exploit this flaw remotely (AV:N) without user interaction (UI:N) to write arbitrary files to the file system outside the intended directories. This can lead to complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H) of the host system, as malicious files could overwrite critical system or application files, inject malicious code, or disrupt operations. The vulnerability’s scope is changed (S:C), meaning it can affect resources beyond the initially vulnerable component. Microsoft addressed this issue in Semantic Kernel version 1.70.0. As an interim mitigation, users can implement a Function Invocation Filter that validates and allow-lists the localFilePath arguments passed to the vulnerable methods to prevent unauthorized file writes. No public exploits have been reported yet, but the vulnerability’s critical CVSS score of 10 underscores the urgency for remediation.

Potential Impact

For European organizations, the impact of CVE-2026-25592 is significant, especially for those leveraging Microsoft Semantic Kernel in AI development, orchestration, or deployment environments. Exploitation could allow attackers to overwrite or create arbitrary files on critical systems, potentially leading to full system compromise, data breaches, or disruption of AI services. This could affect intellectual property, sensitive data, and operational continuity. Given the increasing adoption of AI technologies in sectors such as finance, healthcare, manufacturing, and government across Europe, the risk extends to critical infrastructure and sensitive environments. The vulnerability’s ability to be exploited remotely without user interaction increases the attack surface and urgency for patching. Additionally, the compromise of AI orchestration platforms could facilitate further attacks or manipulation of AI-driven decision-making processes, amplifying the threat impact.

Mitigation Recommendations

1. Immediately upgrade Microsoft Semantic Kernel SDK to version 1.70.0 or later to apply the official patch. 2. Until patching is possible, implement a strict Function Invocation Filter to validate and allow-list all localFilePath arguments passed to DownloadFileAsync and UploadFileAsync methods, ensuring paths do not escape intended directories. 3. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to monitor and block suspicious file system write operations originating from Semantic Kernel components. 4. Conduct thorough code reviews and static analysis on any custom plugins or extensions interacting with file system APIs to detect similar path traversal risks. 5. Restrict permissions of the service accounts running Semantic Kernel to the minimum necessary file system access to limit potential damage. 6. Monitor logs for unusual file write activities or errors related to file path handling. 7. Educate development and security teams about the risks of path traversal vulnerabilities and secure coding practices related to file handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69865658f9fa50a62f32f7ee

Added to database: 2/6/2026, 9:00:08 PM

Last enriched: 2/6/2026, 9:14:32 PM

Last updated: 2/6/2026, 10:15:05 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats