CVE-2026-8116
Description
A weakness has been identified in huangjunsen0406 xiaozhi-mcphub up to 1.0.3. This vulnerability affects unknown code of the file src/controllers/dxtController.ts. This manipulation of the argument manifest.name causes path traversal. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in xiaozhi-mcphub's DXT upload handler allows authenticated remote attackers to write files outside intended directory via crafted manifest.name.
Vulnerability
Overview
A path traversal vulnerability (CWE-22) has been identified in huangjunsen0406/xiaozhi-mcphub up to version 1.0.3. The flaw resides in the DXT upload handler within src/controllers/dxtController.ts. When processing an uploaded .dxt archive, the application reads a manifest.json file from the archive and uses the untrusted manifest.name value to construct the final extraction directory. Because manifest.name is not sanitized or validated against path traversal sequences, an attacker can inject directory traversal payloads (e.g., ../) to cause extracted files to be written outside the intended upload directory [1][2].
Exploitation
Prerequisites
Exploitation requires an authenticated user who can upload a crafted DXT archive. The attack is performed remotely by sending a malicious archive where the manifest.name field contains path traversal sequences. The vulnerable code then uses path.join with the unsanitized name to compute the final extraction path, and subsequently moves files from a temporary directory to that location via fs.renameSync [2]. No additional privileges beyond standard upload access are needed.
Impact
Successful exploitation allows an attacker to write arbitrary files to arbitrary locations on the server filesystem, subject to the permissions of the running process. This could lead to overwriting critical configuration files, injecting malicious scripts (e.g., into web-accessible directories), or achieving remote code execution. The vulnerability has been publicly disclosed with a proof-of-concept, increasing the risk of active exploitation [2].
Mitigation
Status
As of the publication date, the vendor has not responded to the issue report and no patch is available. Users are advised to restrict access to the DXT upload functionality, monitor for suspicious uploads, and consider applying network-level controls until a fix is released [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.0.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.