<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Agentscope — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/agentscope/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 20 Apr 2026 05:16:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/agentscope/feed.xml" rel="self" type="application/rss+xml"/><item><title>Modelscope Agentscope Code Injection Vulnerability (CVE-2026-6603)</title><link>https://feed.craftedsignal.io/briefs/2026-04-agentscope-code-injection/</link><pubDate>Mon, 20 Apr 2026 05:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-agentscope-code-injection/</guid><description>A code injection vulnerability exists in modelscope agentscope up to version 1.0.18, specifically affecting the execute_python_code/execute_shell_command functions, allowing for remote code execution.</description><content:encoded><![CDATA[<p>A critical code injection vulnerability, identified as CVE-2026-6603, affects modelscope agentscope versions up to 1.0.18. The vulnerability resides within the <code>execute_python_code</code> and <code>execute_shell_command</code> functions in the <code>src/AgentScope/tool/_coding/_python.py</code> file. This flaw allows an attacker to inject arbitrary code, leading to potential remote code execution on the affected system. A public exploit is available, increasing the risk of widespread exploitation. The vendor was contacted but has not responded to the disclosure. This vulnerability poses a significant threat to systems running vulnerable versions of agentscope, potentially leading to compromise and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of modelscope agentscope running a version up to 1.0.18.</li>
<li>The attacker crafts a malicious request targeting the <code>execute_python_code</code> or <code>execute_shell_command</code> function.</li>
<li>The malicious request injects arbitrary code into the vulnerable function&rsquo;s input.</li>
<li>The application processes the injected code without proper sanitization or validation.</li>
<li>The injected code is executed by the system, potentially allowing the attacker to execute arbitrary commands.</li>
<li>The attacker leverages the executed code to gain further access to the system or network.</li>
<li>The attacker installs malware, establishes persistence, or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6603 can result in arbitrary code execution on the affected system. This can lead to complete system compromise, data breaches, and unauthorized access to sensitive information. While the exact number of victims is currently unknown, the availability of a public exploit makes widespread exploitation highly probable. Organizations using modelscope agentscope are at risk and should take immediate action to mitigate this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade modelscope agentscope to a patched version beyond 1.0.18 to remediate the vulnerability (CVE-2026-6603).</li>
<li>Implement the provided Sigma rule to detect suspicious process execution originating from the agentscope application server.</li>
<li>Monitor web server logs for unusual requests targeting the <code>execute_python_code</code> or <code>execute_shell_command</code> endpoints (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>remote-code-execution</category><category>agentscope</category></item></channel></rss>