Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @paperclipai/shared
  4. ›
  5. GHSA-3pw3-v88x-xj24

GHSA-3pw3-v88x-xj24: Paperclip: Arbitrary File Read via Agent-Controlled adapterConfig.instructionsFilePath

April 16, 2026

Paperclip contains an arbitrary file read vulnerability that allows an attacker with an Agent API key to read files from the Paperclip server host filesystem. The vulnerability occurs because agents are allowed to modify their own adapterConfig through the /agents/:id API endpoint. The configuration field adapterConfig.instructionsFilePath is later read directly by the server runtime using fs.readFile(). Because no validation or path restriction is applied, an attacker can supply an arbitrary filesystem path. The Paperclip server then attempts to read that path from the host filesystem during agent execution. This breaks the intended trust boundary between agent runtime configuration and server host filesystem access, allowing a compromised or malicious agent to access sensitive files on the host system.

References

  • github.com/advisories/GHSA-3pw3-v88x-xj24
  • github.com/paperclipai/paperclip
  • github.com/paperclipai/paperclip/security/advisories/GHSA-3pw3-v88x-xj24

Code Behaviors & Features

Detect and mitigate GHSA-3pw3-v88x-xj24 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.416.0

Fixed versions

  • 2026.416.0

Solution

Upgrade to version 2026.416.0 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-73: External Control of File Name or Path

Source file

npm/@paperclipai/shared/GHSA-3pw3-v88x-xj24.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:08 +0000.