AGL app-framework-main Critical Zip Slip + TOCTOU Vulnerability (CVE-2026-37531)
The National Vulnerability Database has disclosed CVE-2026-37531, a critical Zip Slip path traversal vulnerability combined with a Time-of-Check to Time-of-Use (TOCTOU) race condition in AGL app-framework-main versions up to 17.1.12. This flaw, rated 9.8 (Critical) on the CVSS scale, allows unauthenticated attackers to write arbitrary files anywhere on the filesystem.
The core issue lies in the widget installation flow. According to the National Vulnerability Database, the is_valid_filename function fails to block dot notation directory traversal sequences, only checking for absolute paths. Crucially, the file extraction via zread occurs before signature verification. Even if the signature check fails, the cleanup process only removes temporary work directory files, leaving maliciously placed files permanently on the system. This pre-authentication, pre-verification file write capability is a catastrophic design flaw.
This isn’t just a theoretical vulnerability; it’s a critical remote code execution vector. An attacker can craft a malicious widget, leverage the path traversal to write executable code to a sensitive location, and then potentially trigger its execution. The fact that files persist even after a failed signature verification means that defenders cannot rely on cryptographic checks to prevent initial compromise. This is a severe threat to the integrity and availability of affected systems.
What This Means For You
- If your organization uses AGL app-framework-main, you need to immediately assess your exposure to CVE-2026-37531. Prioritize patching to version 17.1.12 or later if available, or implement compensating controls to restrict untrusted widget installations. Assume compromise if you cannot confirm patches are in place and audit your filesystem for unexpected files in critical directories, especially those that could be dropped by a widget installation process.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-37531 - AGL app-framework-main Zip Slip and TOCTOU Widget Installation
title: CVE-2026-37531 - AGL app-framework-main Zip Slip and TOCTOU Widget Installation
id: scw-2026-05-01-ai-1
status: experimental
level: critical
description: |
This rule detects the exploitation of CVE-2026-37531 in AGL app-framework-main. It specifically looks for the 'install-widget' command being executed by the AGL app-framework-main binary, combined with a '..' path traversal sequence in the TargetFilename, indicating a Zip Slip attack attempting to write files outside the intended directory. The TOCTOU race condition allows this to happen before signature verification.
author: SCW Feed Engine (AI-generated)
date: 2026-05-01
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-37531/
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: process_creation
detection:
selection:
Image|contains:
- '/usr/bin/agl-app-framework-main'
CommandLine|contains:
- 'install-widget'
TargetFilename|contains:
- '../'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-37531 | Path Traversal | AGL app-framework-main thru 17.1.12, CWE-22, vulnerable function: is_valid_filename in wgtpkg-zip.c |
| CVE-2026-37531 | Race Condition | AGL app-framework-main thru 17.1.12, CWE-367, vulnerable function: install_widget in wgtpkg-install.c (extraction via zread occurs BEFORE signature verification) |
| CVE-2026-37531 | Code Injection | AGL app-framework-main thru 17.1.12, vulnerable function: zread using openat(workdirfd, filename, O_CREAT) allowing arbitrary file write |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 01, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.