Back to VulnFeed / CVE-2026-7784
root@hackertop:~/vulnfeed/CVE-2026-7784#
CVE-2026-7784 MEDIUM Path Traversal ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

RTGS2017 NagaAgent up to 5.1.0 Skills Endpoint extensions.py Name path traversal

NagaAgent 17d ago Impact pending confirmation
LIFECYCLE
6.6 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability classified as critical has been found in RTGS2017 NagaAgent up to 5.1.0. This affects an unknown code block of the file apiserver/routes/extensions.py of the component Skills Endpoint. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument name with an unknown input leads to a unknown weakness. CWE is classifying the issue as CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Impact: This is going to have an impact on confidentiality, integrity, and availability.

Exploit: The exploit is shared for download at github.com. It is declared as proof-of-concept. The project was informed of the problem early through an issue report but has not responded yet.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7784 · CVSS 6.6 · Active Threat