CVE-2026-26057: Skill-scanner Unsecured Network Binding Vulnerability
(updated )
Description: A vulnerability in the API Server of Skill Scanner could allow a unauthenticated, remote attacker to interact with the server API and either trigger a denial of service (DoS) condition or upload arbitrary files.
This vulnerability is due to an erroneous binding to multiple interfaces. An attacker could exploit this vulnerability by sending API requests to a device exposing the affected API Server. A successful exploit could allow the attacker to consume an excessive amount of resources (memory starvation) or to upload files to arbitrary folders on the affected device.
Conditions: This vulnerability affects Skill-scanner 1.0.1 and earlier releases when the API Server is enabled. The API Server is not enabled by default.
Fixed Software: Skill-scanner software releases 1.0.2 and later contained the fix for this vulnerability.
For more information: If you have any questions or comments about this advisory:
- Open an issue in cisco-ai-defense/skill-scanner
- Email Cisco Open Source Security (oss-security@cisco.com) and Cisco PSIRT (psirt@cisco.com)
Credits:
- Research: Richard Tweed (@RichardoC)
- Fix ideation and implementation: Richard Tweed (@RichardoC)
- Release engineering: Vineeth Sai Narajala (@vineethsai7)
References
Code Behaviors & Features
Detect and mitigate CVE-2026-26057 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →