<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AgiFlow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/agiflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 08:16:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/agiflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)</title><link>https://feed.craftedsignal.io/briefs/2024-01-agiflow-path-traversal/</link><pubDate>Tue, 28 Apr 2026 08:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-agiflow-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.</description><content:encoded><![CDATA[<p>AgiFlow scaffold-mcp, a software component with unknown functionality, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7237, affects versions up to 1.0.27. The vulnerability resides in the <code>packages/scaffold-mcp/src/server/index.ts</code> file, specifically within the &ldquo;write-to-file&rdquo; tool. An attacker can remotely exploit this flaw by manipulating the <code>file_path</code> argument, enabling them to write to arbitrary locations on the server. A patch has been released in version 1.1.0 with commit hash <code>c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6</code> to address this vulnerability. The exploit is publicly available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AgiFlow scaffold-mcp instance running a vulnerable version (&lt;= 1.0.27).</li>
<li>The attacker crafts a malicious request targeting the &ldquo;write-to-file&rdquo; tool.</li>
<li>The request includes a manipulated <code>file_path</code> argument containing path traversal sequences (e.g., &ldquo;../&rdquo;, &ldquo;..\&rdquo;).</li>
<li>The server-side application processes the request without proper sanitization or validation of the <code>file_path</code> argument.</li>
<li>The application attempts to write data to the attacker-controlled file path.</li>
<li>Due to the path traversal sequences, the data is written to an arbitrary location on the server&rsquo;s file system.</li>
<li>The attacker may overwrite critical system files, inject malicious code, or exfiltrate sensitive data, depending on the write permissions and targeted file location.</li>
<li>Successful exploitation leads to arbitrary code execution, data compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7237 allows attackers to write arbitrary files to the affected system, potentially leading to code execution, data exfiltration, or denial of service. The number of affected installations is currently unknown. Due to the public availability of the exploit, organizations using AgiFlow scaffold-mcp are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AgiFlow scaffold-mcp to version 1.1.0 or later to remediate CVE-2026-7237, applying the patch identified by commit hash <code>c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6</code>.</li>
<li>Implement input validation and sanitization on the <code>file_path</code> argument within the &ldquo;write-to-file&rdquo; tool to prevent path traversal attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect AgiFlow Scaffold-mcp Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in the URI.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>cve</category><category>web-application</category></item></channel></rss>