PT-2026-31854 · Unknown · Zahayujie Chatgpt-On-Wechat Cowagent
Yu_Bao
·
Published
2026-04-10
·
Updated
2026-04-10
·
CVE-2026-5998
CVSS v3.1
5.3
Medium
| AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
zahayujie chatgpt-on-wechat CowAgent versions up to 2.0.4
Description
A flaw exists in the function dispatch of the file agent/memory/service.py within the API Memory Content Endpoint component. Manipulation of the
filename argument can lead to path traversal, allowing for remote exploitation. The exploit has been published.Recommendations
Upgrade to version 2.0.5 to resolve the issue.
Exploit
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Zahayujie Chatgpt-On-Wechat Cowagent