docx

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (HIGH): In ooxml/scripts/unpack.py, the call to zipfile.ZipFile.extractall() is vulnerable to Zip Slip. A maliciously crafted Office document containing filenames with path traversal sequences (e.g., ../../.bashrc) can overwrite sensitive files outside the intended directory, potentially leading to persistent system access or code execution.
  • DATA_EXFILTRATION (MEDIUM): In ooxml/scripts/validation/docx.py, the DOCXSchemaValidator uses lxml.etree.parse() to process XML files. lxml is susceptible to XML External Entity (XXE) attacks by default. An attacker-controlled document containing malicious DTDs could be used to read local system files or perform server-side request forgery (SSRF).
  • REMOTE_CODE_EXECUTION (MEDIUM): In ooxml/scripts/pack.py, the validate_document function executes the soffice (LibreOffice) binary via subprocess.run() to process generated files. Invoking complex external parsers on untrusted data exposes the host environment to potential memory corruption or logic vulnerabilities within the office suite.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:01 PM