Plattform
python
Komponente
metagpt
Behoben in
0.8.1
0.8.2
0.8.3
A cross-site request forgery (CSRF) vulnerability has been identified in MetaGPT FoundationAgents versions up to 0.8.2. This flaw resides within the evaluateCode function of the metagpt/environment/minecraft/mineflayer/index.js file, specifically within the Mineflayer HTTP API component. Successful exploitation allows a remote attacker to trigger unintended actions on a user's behalf, potentially leading to unauthorized modifications or data manipulation.
The CSRF vulnerability in MetaGPT FoundationAgents allows an attacker to craft malicious requests that appear to originate from a legitimate user. This can be leveraged to perform actions such as modifying configurations, executing commands, or accessing sensitive data within the MetaGPT environment. The impact is amplified if the user has elevated privileges or if the system interacts with other critical services. While the specific attack surface depends on the application's functionality, the potential for unauthorized actions is significant. The publicly disclosed nature of this vulnerability increases the risk of exploitation.
This vulnerability was publicly disclosed on 2026-04-11 and has a Medium EPSS score, indicating a moderate probability of exploitation. The availability of a public disclosure significantly increases the risk, as attackers can readily leverage this information to develop and deploy exploits. The project maintainers have been notified but have not yet responded with a fix, further increasing the risk to users.
Organizations and individuals utilizing MetaGPT FoundationAgents versions 0.8.2 and earlier, particularly those integrating the Mineflayer HTTP API with other systems, are at significant risk. Shared hosting environments where multiple users share the same MetaGPT instance are especially vulnerable, as an attacker could potentially exploit the vulnerability on behalf of other users.
• python / server:
import requests
from bs4 import BeautifulSoup
# Example: Check for suspicious requests to the API
url = "http://your-metagpt-instance/api/mineflayer"
response = requests.get(url)
if response.status_code == 200:
soup = BeautifulSoup(response.content, 'html.parser')
# Look for unexpected parameters or actions
if soup.find('param', {'name': 'malicious_action'}) is not None:
print("Potential CSRF attack detected!")• generic web:
curl -I http://your-metagpt-instance/api/mineflayer | grep -i 'referer'disclosure
Exploit-Status
EPSS
0.01% (0% Perzentil)
CISA SSVC
CVSS-Vektor
Due to the lack of a released patch, immediate mitigation strategies are crucial. Implement strict input validation and output encoding to prevent malicious data from being processed. Consider implementing CSRF protection mechanisms, such as synchronizer tokens or double-submit cookies, to mitigate the risk of unauthorized requests. Restrict access to sensitive endpoints and implement robust authentication and authorization controls. Monitor network traffic for suspicious activity and consider using a Web Application Firewall (WAF) to filter out malicious requests. Regularly review and update the MetaGPT FoundationAgents environment to address potential vulnerabilities.
Aktualisieren Sie auf eine korrigierte Version von MetaGPT, die diese Cross-Site Request Forgery (CSRF) Schwachstelle behebt. Weitere Informationen zur Aktualisierung finden Sie im Projekt-Repository oder in den Versionshinweisen. Implementieren Sie zusätzliche Sicherheitsmaßnahmen, wie z. B. Eingabevalidierung und CSRF-Schutz, um das Risiko zu mindern.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-6109 is a cross-site request forgery (CSRF) vulnerability affecting MetaGPT FoundationAgents versions up to 0.8.2, specifically within the Mineflayer HTTP API, allowing attackers to perform unauthorized actions.
If you are using MetaGPT FoundationAgents version 0.8.2 or earlier, you are potentially affected by this vulnerability. Upgrade as soon as a patch is available.
Currently, no official patch is available. Implement mitigation strategies like input validation, CSRF protection mechanisms, and WAF rules until a fix is released.
Due to the public disclosure and ease of exploitation, CVE-2026-6109 is likely being actively exploited. Monitor your systems closely.
Refer to the MetaGPT project's official channels (GitHub repository, website) for updates and advisories regarding CVE-2026-6109.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.