<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-5972 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5972/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 20:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5972/feed.xml" rel="self" type="application/rss+xml"/><item><title>MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-command-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-command-injection/</guid><description>A remote command injection vulnerability exists in FoundationAgents MetaGPT &lt;= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>CVE-2026-5972 describes a critical OS command injection vulnerability affecting FoundationAgents MetaGPT versions up to 0.8.1. The vulnerability resides in the <code>Terminal.run_command</code> function within the <code>metagpt/tools/libs/terminal.py</code> file. This flaw allows remote attackers to inject and execute arbitrary operating system commands on the affected system. The vulnerability is remotely exploitable, meaning that attackers can trigger it over a network without requiring local access. Public exploits for this vulnerability are available, increasing the risk of widespread exploitation. The patch identified as <code>d04ffc8dc67903e8b327f78ec121df5e190ffc7b</code> addresses this vulnerability and upgrading to a patched version is highly recommended.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MetaGPT instance running a version &lt;= 0.8.1.</li>
<li>The attacker crafts a malicious request targeting the <code>Terminal.run_command</code> function.</li>
<li>The malicious request contains an OS command injection payload within the input parameters expected by <code>Terminal.run_command</code>.</li>
<li>MetaGPT processes the request, passing the attacker-controlled input to the underlying operating system&rsquo;s command interpreter without proper sanitization.</li>
<li>The operating system executes the injected command as part of the MetaGPT process, granting the attacker code execution within the server environment.</li>
<li>The attacker leverages the initial foothold to escalate privileges, potentially gaining root access or compromising other services on the system.</li>
<li>The attacker may then install malware, establish persistence, or exfiltrate sensitive data.</li>
<li>The attacker achieves their final objective, which could include data theft, denial of service, or complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, malware installation, and denial of service. Given the publicly available exploit, unpatched MetaGPT instances are at immediate risk. The vulnerability has a CVSS v3.1 score of 7.3, indicating a high level of severity. The number of victims and sectors targeted is currently unknown, but given the nature of the vulnerability, any organization using MetaGPT is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>d04ffc8dc67903e8b327f78ec121df5e190ffc7b</code> provided by FoundationAgents to remediate the vulnerability.</li>
<li>Monitor web server logs for suspicious requests targeting the MetaGPT application, specifically those containing command injection attempts (cs-uri-query, cs-method, sc-status).</li>
<li>Implement the provided Sigma rule to detect command execution originating from the MetaGPT application (logsource).</li>
<li>Review network traffic for unusual outbound connections originating from MetaGPT servers, which could indicate successful exploitation and malware installation (category: network_connection).</li>
<li>Enable and review process creation logs on MetaGPT servers to identify any unexpected child processes spawned by the MetaGPT application, as this could indicate command injection exploitation (category: process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5972</category><category>command-injection</category><category>metagpt</category></item></channel></rss>