No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Evomap
Evomap evolver |
|
| Vendors & Products |
Evomap
Evomap evolver |
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a path traversal vulnerability in the skill download (fetch) command allows attackers to write files to arbitrary locations on the filesystem. The --out= flag accepts user-provided paths without validation, enabling directory traversal attacks that can overwrite critical system files or create files in sensitive location. This issue has been patched in version 1.69.3. | |
| Title | Evolver: Path Traversal via `--out` flag in `fetch` command allows Arbitrary File Write | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-04T17:15:13.381Z
Reserved: 2026-04-23T19:17:30.565Z
Link: CVE-2026-42075
Updated: 2026-05-04T17:15:10.300Z
Status : Received
Published: 2026-05-04T17:16:24.283
Modified: 2026-05-04T18:16:30.240
Link: CVE-2026-42075
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:44:02Z