CVE-2026-25592
Microsoft · Semantic Kernel .NET SDK
Microsoft Semantic Kernel .NET SDK contains an arbitrary file write flaw in the SessionsPythonPlugin. Attackers can exploit DownloadFileAsync or UploadFileAsync to write files to restricted paths.
Executive summary
A critical arbitrary file write vulnerability in Microsoft Semantic Kernel .NET SDK could allow attackers to overwrite sensitive system files or achieve remote code execution.
Vulnerability
This vulnerability exists within the SessionsPythonPlugin component of the SDK. An attacker can manipulate the localFilePath argument in the DownloadFileAsync or UploadFileAsync functions to perform arbitrary file writes, likely without requiring high-level authentication depending on the implementation's exposure.
Business impact
A successful exploit allows an attacker to overwrite critical application files or configuration data, leading to a complete compromise of the host system. Given the CVSS score of 9.9, this represents a near-maximum risk to data integrity and system availability, potentially facilitating persistent access within AI-orchestrated environments.
Remediation
Immediate Action: Administrators must update Microsoft.SemanticKernel.Core to version 1.70.0 or later immediately to patch the vulnerable plugin logic.
Proactive Monitoring: Implement logging for all file system interactions initiated by the Semantic Kernel and review arguments passed to the SessionsPythonPlugin for suspicious path traversal patterns.
Compensating Controls: As a temporary measure, developers can implement a Function Invocation Filter to validate and allow-list localFilePath arguments before they reach the vulnerable functions.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The severity of this arbitrary file write flaw necessitates immediate remediation. Organizations utilizing the Semantic Kernel .NET SDK for AI agent orchestration should prioritize the update to version 1.70.0 to prevent total system compromise.