<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-22661 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-22661/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-22661/feed.xml" rel="self" type="application/rss+xml"/><item><title>prompts.chat Path Traversal Vulnerability (CVE-2026-22661)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</guid><description>A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.</description><content:encoded><![CDATA[<p>prompts.chat, a software application, is vulnerable to a path traversal attack (CVE-2026-22661) in versions prior to commit 0f8d4c3. This vulnerability stems from insufficient server-side validation of filenames within skill file archives. A remote attacker can exploit this by crafting malicious ZIP archives that contain filenames with path traversal sequences (e.g., ../). When a vulnerable prompts.chat instance extracts these archives, the lack of proper sanitization allows the attacker to write files to arbitrary locations on the file system, potentially overwriting critical system files and achieving arbitrary code execution. This poses a significant risk to system integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious ZIP archive containing a specially crafted skill file.</li>
<li>The filenames within the ZIP archive include path traversal sequences such as <code>../</code>.</li>
<li>The attacker uploads the malicious ZIP archive to the prompts.chat application.</li>
<li>prompts.chat processes the uploaded ZIP archive without properly sanitizing the filenames.</li>
<li>The application extracts the contents of the ZIP archive, writing files to locations specified in the malicious filenames.</li>
<li>Path traversal sequences in the filenames allow the attacker to write files outside the intended extraction directory.</li>
<li>The attacker overwrites shell initialization files (e.g., <code>.bashrc</code>, <code>.profile</code>, <code>.bash_profile</code>) or other executable files.</li>
<li>When a user logs in or a new shell is spawned, the overwritten initialization file executes malicious code, granting the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22661 allows an attacker to write arbitrary files to the client system, leading to potential overwrite of sensitive system files and arbitrary code execution. The vulnerability affects systems running vulnerable versions of prompts.chat. The impact includes complete compromise of the system, data theft, and further propagation of malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch by upgrading to commit 0f8d4c3 or later to remediate CVE-2026-22661.</li>
<li>Implement server-side filename validation and sanitization to prevent path traversal attacks when handling ZIP archives within prompts.chat.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in filenames as identified by the provided rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>code-execution</category><category>cve-2026-22661</category><category>prompts.chat</category><category>linux</category></item></channel></rss>