Platform
python
Component
astrbot
Fixed in
4.22.1
4.22.2
CVE-2026-6117 describes a security vulnerability discovered in AstrBot, specifically impacting versions 4.22.0 through 4.22.1. This flaw resides within the installpluginupload function of the astrbot/dashboard/routes/plugin.py file, related to file upload handling. The vulnerability allows for manipulation of the File argument, leading to a sandbox issue and potentially enabling remote code execution. A public exploit is available, highlighting the immediate risk.
The core of this vulnerability lies in the mishandling of file uploads within AstrBot's plugin installation process. An attacker can exploit this by crafting malicious plugin files designed to bypass the intended sandbox restrictions. Successful exploitation could lead to arbitrary code execution on the server hosting AstrBot, granting the attacker complete control over the system. This could involve data theft, modification of system configurations, or even the deployment of further malicious payloads. The public availability of an exploit significantly increases the likelihood of widespread exploitation.
This vulnerability has been publicly disclosed and a proof-of-concept exploit is available, indicating a higher probability of exploitation. The vulnerability has been added to the CISA KEV catalog, further emphasizing its significance. The lack of a response from the project developers raises concerns about the timeliness of a patch and the potential for continued exploitation.
Exploit Status
EPSS
0.04% (13% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-6117 is to upgrade AstrBot to a version that addresses this vulnerability. As of the current information, no patched version has been released. Until a patch is available, consider implementing temporary workarounds. These might include restricting file upload sizes, implementing stricter file type validation on the server-side, and employing a Web Application Firewall (WAF) to filter out potentially malicious requests. Monitor AstrBot's logs for any suspicious file upload activity. After a patch is released, upgrade AstrBot and confirm the fix by attempting a plugin upload with a known malicious payload (in a controlled environment) to ensure the sandbox restrictions are properly enforced.
Update AstrBot to a patched version. The vendor has not responded to vulnerability reports, so it is recommended to monitor official project updates for a solution.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-6117 is a medium severity vulnerability affecting AstrBot versions 4.22.0–4.22.1. It allows remote attackers to manipulate file uploads, potentially leading to code execution.
If you are running AstrBot versions 4.22.0 or 4.22.1, you are potentially affected by this vulnerability. Upgrade as soon as a patch is available.
The recommended fix is to upgrade to a patched version of AstrBot. Until a patch is released, implement temporary workarounds like file size restrictions and WAF rules.
A public exploit exists, indicating a high probability of active exploitation. Monitor your systems for suspicious activity.
As of the current information, no official advisory has been released by the AstrBot developers. Monitor their website and relevant security mailing lists for updates.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.