Path Traversal Vulnerability in ErlichLiu Claude-Agent SDK
CVE-2026-7235

6.9MEDIUM

Key Information:

Vendor

Erlichliu

Vendor
CVE Published:
28 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-7235?

A security vulnerability exists in the ErlichLiu claude-agent-sdk-master, related to the improper handling of the outputFile argument in the app/api/agent-output/route.ts file. This flaw allows for path traversal attacks, potentially enabling an attacker to access sensitive files on the server. The issue was publicly disclosed and can be exploited remotely. Although the vendor was notified of the problem, there has been no public response or fix as of yet. This vulnerability emphasizes the importance of using secure coding practices and vigilant software maintenance.

Affected Version(s)

claude-agent-sdk-master b185aa7ff0d864581257008077b4010fca1747bf

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

BruceJin (VulDB User)
VulDB CNA Team
.