Vulnerability Description
A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This issue affects the function Terminal.run_command in the library metagpt/tools/libs/terminal.py. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is d04ffc8dc67903e8b327f78ec121df5e190ffc7b. Applying a patch is the recommended action to fix this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Deepwisdom | Metagpt | <= 0.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/FoundationAgents/MetaGPT/Product
- https://github.com/FoundationAgents/MetaGPT/issues/1929Issue TrackingExploit
- https://github.com/paipeline/MetaGPT/commit/d04ffc8dc67903e8b327f78ec121df5e190fPatch
- https://vuldb.com/submit/791745ExploitThird Party AdvisoryVDB Entry
- https://vuldb.com/vuln/356526Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/356526/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-5972?
CVE-2026-5972 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This issue affects the function Terminal.run_command in the library metagpt/tools/libs/terminal.py. The manipulation leads to os...
How severe is CVE-2026-5972?
CVE-2026-5972 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5972?
Check the references section above for vendor advisories and patch information. Affected products include: Deepwisdom Metagpt.