Threat Advisory

APM CLI Plugin Path Escaping Leads to Arbitrary File Access

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

CVE-2026-44641 with a CVSS score of 7.1 is a vulnerability affecting the Microsoft APM CLI package in versions up to 0.8.11, specifically its plugin .json component, which allows attackers to escape plugin root paths and copy arbitrary host files during installation. An attacker can exploit this vulnerability by creating a malicious plugin with an absolute path or '../' traversal path in the manifest fields 'agents', 'skills', 'commands', and 'hooks', which are attacker-controlled. This enables the attacker to copy external files or directories from the installer's machine into the APM directory, potentially leading to a local supply-chain trust-boundary violation with direct confidentiality and integrity impact. The capability gained by the attacker includes the ability to read and write sensitive files, potentially leading to data breaches or unauthorized modifications. The business impact and consequences of exploitation include compromised data integrity, confidentiality breaches, and potential financial losses. This vulnerability requires a local installation path, allowing the attacker to manipulate the plugin installation process and inject malicious content.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

CVE-2026-44641 with a CVSS score of 7.1 is a vulnerability affecting the Microsoft APM CLI package in versions up to 0.8.11, specifically its plugin .json component, which allows attackers to escape plugin root paths and copy arbitrary host files during installation. An attacker can exploit this vulnerability by creating a malicious plugin with an absolute path or '../' traversal path in the manifest fields 'agents', 'skills', 'commands', and 'hooks', which are attacker-controlled. This enables the attacker to copy external files or directories from the installer's machine into the APM directory, potentially leading to a local supply-chain trust-boundary violation with direct confidentiality and integrity impact. The capability gained by the attacker includes the ability to read and write sensitive files, potentially leading to data breaches or unauthorized modifications. The business impact and consequences of exploitation include compromised data integrity, confidentiality breaches, and potential financial losses. This vulnerability requires a local installation path, allowing the attacker to manipulate the plugin installation process and inject malicious content.[emaillocker id="1283"]

RECOMMENDATION:

We recommend you to update apm-cli to version 0.8.12.

REFERENCES:

The following reports contain further technical details:
https://github.com/advisories/GHSA-xhrw-5qxx-jpwr

[/emaillocker]
crossmenu