<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5974 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5974/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 20:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5974/feed.xml" rel="self" type="application/rss+xml"/><item><title>MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-cmd-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-cmd-injection/</guid><description>A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, tracked as CVE-2026-5974, has been identified in FoundationAgents MetaGPT up to version 0.8.1. The vulnerability resides within the <code>Bash.run</code> function located in the <code>metagpt/tools/libs/terminal.py</code> library. An attacker can exploit this flaw by injecting malicious commands into the <code>Bash.run</code> function, leading to arbitrary OS command execution on the target system. The vulnerability is remotely exploitable, posing a significant risk. Although the developers were notified via a pull request, no patch has been released as of the publication of this brief. This vulnerability could be exploited to gain unauthorized access, escalate privileges, or compromise the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a MetaGPT instance running version 0.8.1 or earlier.</li>
<li>The attacker crafts a malicious input string containing OS commands.</li>
<li>This malicious string is passed to the <code>Bash.run</code> function in <code>metagpt/tools/libs/terminal.py</code>.</li>
<li>Due to insufficient input validation, the injected commands are not properly neutralized.</li>
<li>The <code>Bash.run</code> function executes the injected OS commands using the underlying operating system&rsquo;s shell.</li>
<li>The attacker gains the ability to execute arbitrary code on the server.</li>
<li>The attacker could then install malware, create new user accounts, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to execute arbitrary operating system commands on the server hosting the vulnerable MetaGPT instance. This could lead to complete system compromise, including data theft, malware installation, and denial-of-service attacks. Due to the nature of command injection, the impact is highly dependent on the privileges of the user account running the MetaGPT application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>Bash.run</code> function in the <code>metagpt/tools/libs/terminal.py</code> library to prevent command injection (CVE-2026-5974).</li>
<li>Monitor process creations for unusual commands executed by the MetaGPT application (see Sigma rule &ldquo;Detect Suspicious MetaGPT Bash.run Execution&rdquo;).</li>
<li>Deploy a web application firewall (WAF) to filter out potentially malicious payloads being sent to the MetaGPT application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>metagpt</category><category>cve-2026-5974</category></item></channel></rss>