VYPR
Critical severityNVD Advisory· Published Mar 20, 2025· Updated Oct 15, 2025

Path Traversal in modelscope/agentscope

CVE-2024-8551

Description

A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially leading to the exposure or modification of sensitive information such as configuration files, API keys, and hardcoded passwords.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal in AgentScope's save-workflow/load-workflow allows reading/writing arbitrary JSON files, exposing keys and credentials.

Vulnerability

Description

A path traversal vulnerability exists in the save-workflow and load-workflow functionality of the modelscope/agentscope Python library prior to the fix [2]. The flaw allows an attacker to navigate outside the intended directory and read or write arbitrary JSON files on the filesystem. The vulnerable code resides in src/agentscope/studio/_app.py where user-supplied path inputs are not properly sanitized [3].

Attack

Vector & Exploitation

Exploitation does not require authentication if the workflow endpoints are exposed. An attacker can send crafted requests with directory traversal sequences (e.g., ../) in the workflow name or path parameter. The attacker can then read sensitive files like configuration files or API keys (.json format) or overwrite them with malicious JSON content. No special network position is needed beyond network access to the AgentScope service.

Impact

Successful exploitation leads to exposure or modification of sensitive information including API keys, hardcoded passwords, and other secrets stored in JSON files on the server [2]. This could result in privilege escalation, lateral movement, or compromise of connected services.

Mitigation

The issue is fixed in later versions of AgentScope. Users should update to the latest release. No workaround is publicly documented. The vulnerability does not appear on the CISA KEV list as of publication.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
agentscopePyPI
<= 0.1.1

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.