Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4307: Path Traversal in frdel agent-zero

0
Medium
VulnerabilityCVE-2026-4307cvecve-2026-4307
Published: Tue Mar 17 2026 (03/17/2026, 03:32:07 UTC)
Source: CVE Database V5
Vendor/Project: frdel
Product: agent-zero

Description

CVE-2026-4307 is a medium severity path traversal vulnerability in frdel's agent-zero version 0. 9. 7-10, specifically in the get_abs_path function within python/helpers/files. py. This flaw allows remote attackers to manipulate file paths, potentially accessing unauthorized files on the system. The vulnerability requires low privileges but no user interaction and can be exploited over the network. Although the vendor was notified, no patch or response has been provided, and a public exploit is available. The CVSS 4. 0 score is 5. 3, reflecting moderate impact primarily on confidentiality.

AI-Powered Analysis

AILast updated: 03/17/2026, 04:27:51 UTC

Technical Analysis

CVE-2026-4307 is a path traversal vulnerability identified in frdel's agent-zero software, version 0.9.7-10. The flaw resides in the get_abs_path function located in python/helpers/files.py, where insufficient validation of file path inputs allows an attacker to traverse directories outside the intended scope. This can enable unauthorized reading of arbitrary files on the affected system. The vulnerability is remotely exploitable without user interaction and requires only low-level privileges, making it accessible to a wide range of attackers. The vendor was informed early but has not issued any patches or advisories, increasing the risk of exploitation. A public exploit has been released, which could facilitate automated attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. This vulnerability could be leveraged to access sensitive configuration files, credentials, or other critical data stored on the host, potentially leading to further compromise. Given the lack of vendor response and available exploit code, this vulnerability poses a tangible risk to organizations using the affected software version.

Potential Impact

The primary impact of CVE-2026-4307 is unauthorized disclosure of sensitive information due to path traversal, which can compromise confidentiality. Attackers exploiting this vulnerability can read arbitrary files, potentially exposing credentials, configuration files, or other sensitive data. This can lead to further attacks such as privilege escalation, lateral movement, or data exfiltration. Since the vulnerability is remotely exploitable without user interaction and requires only low privileges, it increases the attack surface significantly. Organizations relying on agent-zero 0.9.7-10 in critical environments may face data breaches, operational disruptions, and reputational damage. The absence of a vendor patch and the availability of public exploits heighten the urgency for mitigation. However, the vulnerability does not directly affect system integrity or availability, limiting its impact to confidentiality breaches primarily.

Mitigation Recommendations

Organizations should immediately audit their use of frdel agent-zero and identify any instances running version 0.9.7-10. Since no official patch is available, temporary mitigations include restricting network access to the agent-zero service to trusted hosts only, employing network-level filtering or firewall rules to limit exposure. Implement application-layer input validation or proxy filtering to detect and block path traversal attempts targeting the get_abs_path function. Monitor logs for suspicious file access patterns indicative of traversal attacks. Consider deploying host-based intrusion detection systems (HIDS) to alert on unauthorized file reads. If feasible, isolate affected systems in segmented network zones to reduce lateral movement risk. Engage with the vendor or community for updates or unofficial patches. Plan for upgrading to a patched version once available. Additionally, conduct regular backups and ensure sensitive files have appropriate permissions to minimize damage from potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-16T21:31:48.889Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b8d4e1771bdb17492801bd

Added to database: 3/17/2026, 4:13:21 AM

Last enriched: 3/17/2026, 4:27:51 AM

Last updated: 3/17/2026, 5:18:20 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses