Plattform
python
Komponente
metagpt
Behoben in
0.8.1
0.8.2
0.8.3
A code injection vulnerability has been identified in MetaGPT FoundationAgents versions up to 0.8.2. This flaw resides within the generate_thoughts function of the metagpt/strategy/tot.py file, a component of the Tree-of-Thought Solver. Successful exploitation allows attackers to inject and execute arbitrary code, potentially compromising the system. The project maintainers have been notified but have not yet responded.
The impact of this code injection vulnerability is significant. An attacker can leverage the generate_thoughts function to inject malicious code into the MetaGPT system. This could lead to complete system compromise, including data exfiltration, denial of service, or further exploitation of other vulnerabilities. The publicly available exploit dramatically lowers the barrier to entry for attackers, increasing the likelihood of exploitation. Given MetaGPT's potential use in automated tasks and decision-making, the consequences could extend beyond simple data breaches, potentially impacting business operations and strategic decisions.
This vulnerability is considered actively exploitable due to the availability of a public proof-of-concept. It was disclosed on 2026-04-11 and added to the NVD database. The project maintainers have been notified but have not yet responded, indicating a potential lack of active support. The existence of a public exploit suggests a medium to high probability of exploitation in the wild.
Organizations utilizing MetaGPT FoundationAgents in production environments, particularly those with limited network segmentation or inadequate input validation practices, are at significant risk. Development teams integrating MetaGPT into their workflows should also be aware of this vulnerability and prioritize patching.
• python / server:
import os
import subprocess
def check_metagpt_version():
try:
result = subprocess.check_output(['pip', 'show', 'metagpt'], stderr=subprocess.STDOUT)
version = result.decode('utf-8').split('Version: ')[1].strip()
if version <= '0.8.2':
print(f"MetaGPT version is vulnerable: {version}")
else:
print(f"MetaGPT version is patched: {version}")
except FileNotFoundError:
print("MetaGPT is not installed.")
except Exception as e:
print(f"Error checking MetaGPT version: {e}")
check_metagpt_version()• python / supply-chain: Monitor Python package dependencies for known vulnerabilities using tools like pip audit or safety.
• generic web: Monitor access logs for unusual requests targeting the metagpt/strategy/tot.py endpoint.
disclosure
poc
kev
Exploit-Status
EPSS
0.07% (21% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-6110 is to upgrade MetaGPT FoundationAgents to a version beyond 0.8.2 as soon as a patched version is released by the project maintainers. Until a patch is available, consider implementing strict input validation on any data passed to the generate_thoughts function. While a direct WAF rule is unlikely to be effective without understanding the specific injection patterns, monitoring for unusual code execution within the metagpt/strategy/tot.py file can provide early warning signs. Review and restrict permissions for the user account running the MetaGPT process to limit the potential damage from a successful exploit.
Die Code Injection Vulnerabilität in der Funktion `generate_thoughts` von `tot.py` kann gemildert werden, indem die an diese Funktion bereitgestellte Eingabe sorgfältig überprüft und validiert wird, um die Ausführung von bösartigem Code zu verhindern. Es wird empfohlen, auf eine korrigierte Version zu aktualisieren, sobald diese verfügbar ist.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-6110 is a code injection vulnerability affecting MetaGPT FoundationAgents versions up to 0.8.2. It allows attackers to remotely execute arbitrary code by manipulating the generate_thoughts function.
You are affected if you are using MetaGPT FoundationAgents version 0.8.2 or earlier. Upgrade to a patched version as soon as possible.
The recommended fix is to upgrade to a patched version of MetaGPT FoundationAgents. As a fix is not yet available, implement temporary workarounds like restricting network access and input validation.
A public exploit is available, indicating a high probability of active exploitation. Security teams should prioritize remediation.
Refer to the MetaGPT project's official channels (GitHub repository, website) for updates and advisories regarding CVE-2026-6110.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.