Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.5

Skill-Scanner: Unsecured API Server Allows Unauthorized Access

CVE-2026-26057 GHSA-ppfx-73j5-fhxc
Summary

A security flaw in Skill-Scanner's API server allows attackers to potentially crash the system or upload unauthorized files. This affects Skill-Scanner version 1.0.1 and earlier, and only applies if the API server is enabled. To fix this issue, update to version 1.0.2 or later.

What to do
  • Update cisco-ai-skill-scanner to version 1.0.2.
Affected software
VendorProductAffected versionsFix available
cisco-ai-skill-scanner <= 1.0.2 1.0.2
cisco skill_scanner <= 1.0.2
Original title
Skill-scanner Unsecured Network Binding Vulnerability
Original description
**Description:**
A vulnerability in the API Server of Skill Scanner could allow a unauthenticated, remote attacker to interact with the server API and either trigger a denial of service (DoS) condition or upload arbitrary files.

This vulnerability is due to an erroneous binding to multiple interfaces. An attacker could exploit this vulnerability by sending API requests to a device exposing the affected API Server. A successful exploit could allow the attacker to consume an excessive amount of resources (memory starvation) or to upload files to arbitrary folders on the affected device.

**Conditions:**
This vulnerability affects Skill-scanner 1.0.1 and earlier releases when the API Server is enabled. The API Server is not enabled by default.

**Fixed Software:**
Skill-scanner software releases 1.0.2 and later contained the fix for this vulnerability.

**For more information:**
If you have any questions or comments about this advisory:
- [Open an issue in cisco-ai-defense/skill-scanner](https://github.com/cisco-ai-defense/skill-scanner/issues)
- Email Cisco Open Source Security ([[email protected]](mailto:[email protected])) and Cisco PSIRT ([[email protected]](mailto:[email protected]))

**Credits:**

- Research: Richard Tweed (@RichardoC)
- Fix ideation and implementation: Richard Tweed (@RichardoC)
- Release engineering: Vineeth Sai Narajala (@vineethsai7)
nvd CVSS3.1 9.1
Vulnerability type
CWE-668
Published: 17 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026