Plataforma
python
Componente
foundationagents
Corregido en
0.8.1
0.8.2
A code injection vulnerability has been identified in FoundationAgents MetaGPT, specifically affecting versions 0.8.0 through 0.8.1. This flaw resides within the check_solution function of the HumanEvalBenchmark/MBPPBenchmark component, enabling remote attackers to inject malicious code. The vulnerability is considered HIGH severity and a public exploit is now available, highlighting the urgency of remediation.
Successful exploitation of CVE-2026-5970 allows an attacker to execute arbitrary code on the system running FoundationAgents MetaGPT. This could lead to complete system compromise, data exfiltration, or denial of service. Given the remote nature of the attack and the availability of a public exploit, the potential for widespread exploitation is significant. The impact is amplified by the fact that MetaGPT is likely used in environments where sensitive data or critical processes are managed, potentially leading to cascading failures and significant reputational damage.
This vulnerability is actively being exploited, as evidenced by the public availability of a proof-of-concept. It was reported via a pull request, but the project has not yet responded. The vulnerability is not currently listed on KEV, and the EPSS score is likely to be assessed as medium to high due to the public exploit and ease of exploitation.
Organizations and individuals utilizing FoundationAgents MetaGPT versions 0.8.0 through 0.8.1, particularly those deploying it in environments handling sensitive data or critical infrastructure, are at immediate risk. Those relying on MetaGPT for automated code evaluation or testing are especially vulnerable.
• python / server:
import os
import subprocess
# Check for the vulnerable function
with open('/path/to/your/foundationagents/HumanEvalBenchmark/MBPPBenchmark.py', 'r') as f:
if 'check_solution' in f.read():
print('Vulnerable function detected!')• python / supply-chain:
import subprocess
result = subprocess.run(['pip', 'show', 'foundationagents'], capture_output=True, text=True)
if 'Version: 0.8.0' in result.stdout or 'Version: 0.8.1' in result.stdout:
print('FoundationAgents version is vulnerable!')disclosure
poc
Estado del Exploit
EPSS
0.07% (21% percentil)
CISA SSVC
Vector CVSS
The primary mitigation for CVE-2026-5970 is to upgrade to a patched version of FoundationAgents MetaGPT. As of this writing, no patched version has been released. Until a patch is available, consider implementing input validation on the check_solution function to sanitize user-provided data. While not a complete solution, this can reduce the attack surface. Monitor system logs for suspicious activity related to the HumanEvalBenchmark/MBPPBenchmark component. Implement network segmentation to limit the potential blast radius of a successful attack.
La vulnerabilidad de inyección de código en la función `check_solution` de MetaGPT se puede mitigar actualizando a una versión corregida. Dado que el proyecto no ha respondido, se recomienda revisar el código fuente afectado y aplicar parches de seguridad manualmente o evitar el uso de la función vulnerable hasta que se publique una actualización oficial.
Análisis de vulnerabilidades y alertas críticas directamente en tu correo.
CVE-2026-5970 is a code injection vulnerability affecting FoundationAgents MetaGPT versions 0.8.0–0.8.1. The check_solution function allows remote attackers to inject code, potentially leading to system compromise.
If you are using FoundationAgents MetaGPT versions 0.8.0 or 0.8.1, you are potentially affected by this vulnerability. Immediate action is required.
The recommended fix is to upgrade to a patched version of FoundationAgents MetaGPT. As of now, no patch is available. Implement input validation as a temporary mitigation.
Yes, a public exploit for CVE-2026-5970 is available, indicating active exploitation is likely occurring.
Check the FoundationAgents project repository and website for updates and advisories regarding CVE-2026-5970. As of this writing, no official advisory has been published.
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.
Sube tu archivo requirements.txt y te decimos al instante si estás afectado.