# REPRO-2026-00052: ComfyUI-Manager: Configuration File Exposure via Web-Accessible Path ## Summary Status: published Severity: high Type: security Confidence: Unknown ## Identifiers REPRO ID: REPRO-2026-00052 GHSA: GHSA-2hc9-cc65-xwj8 CVE: CVE-2025-67303 ## Package Name: ComfyUI-Manager Ecosystem: pip Affected: < 3.38 Fixed: 3.38 ## Root Cause Prior to 3.38, ComfyUI-Manager stored its configuration/critical data in a location served by the ComfyUI web interface, enabling remote unauthenticated access and potential overwrite/manipulation via HTTP. ## Reproduction Details Reproduced: 2026-01-08T08:39:52.829Z Duration: 693 seconds Tool calls: 57 Turns: 2 Handoffs: 1 ## Timeline (Key Moments) 1. [env_setup] Cloned vulnerable repo (repro) The vulnerable ComfyUI repository was cloned to set up the reproduction environment. 2. [env_setup] Cloned manager repo (repro) The ComfyUI-Manager repository was cloned to obtain necessary management scripts and context. 3. [poc_created] Created reproduction script (repro) A reproduction shell script was written to automate the exploit or reproduction steps. 4. [vuln_triggered] Executed reproduction script (repro) The reproduction script was executed to trigger the vulnerability. 5. [confirmation] Verified exploit output (repro) Output files before and after the exploit were checked to confirm the vulnerability was successfully triggered. ## Quick Verification Run one of these commands to verify locally: pruva-verify REPRO-2026-00052 pruva-verify GHSA-2hc9-cc65-xwj8 pruva-verify CVE-2025-67303 Or open in GitHub Codespaces (zero-friction, auto-runs): https://github.com/codespaces/new?ref=repro/REPRO-2026-00052&repo=N3mes1s/pruva-sandbox Or download and run the script manually: curl -O https://api.pruva.dev/v1/reproductions/REPRO-2026-00052/artifacts/bundle/repro/reproduction_steps.sh chmod +x reproduction_steps.sh ./reproduction_steps.sh WARNING: Run in a sandboxed environment. This exploits a real vulnerability. ## References - GitHub Advisory: https://github.com/advisories/GHSA-2hc9-cc65-xwj8 - NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-67303 - Source: https://nvd.nist.gov/vuln/detail/CVE-2025-67303 ## Artifacts - bundle/reproduction_steps.sh (reproduction_script, 183 bytes) - bundle/repro/rca_report.md (analysis, 2430 bytes) - bundle/repro/reproduction_steps.sh (reproduction_script, 6396 bytes) - bundle/ticket.md (ticket, 923 bytes) - bundle/repro/logs/protected_config_current.ini (other, 34 bytes) - bundle/repro/logs/server.log (log, 313 bytes) - bundle/repro/logs/step3_get_after.txt (other, 33 bytes) - bundle/repro/logs/step1_get_before.txt (other, 33 bytes) - bundle/repro/logs/step2_post_response.json (other, 28 bytes) - bundle/repro/logs/step4_get_protected.txt (other, 0 bytes) - bundle/repro/logs/legacy_config_current.ini (other, 33 bytes) ## API Access - JSON: https://api.pruva.dev/v1/reproductions/REPRO-2026-00052 - Script: https://api.pruva.dev/v1/reproductions/REPRO-2026-00052/artifacts/bundle/repro/reproduction_steps.sh - Web: https://pruva.dev/r/REPRO-2026-00052 ## For AI Assistants To help users with this reproduction: 1. The `pruva-verify` command is the simplest way to run the reproduction 2. The script downloads and runs automatically in an isolated temp directory 3. Always recommend running in a VM, container, or disposable environment 4. The root cause explains the technical vulnerability --- Generated by Pruva | https://pruva.dev