<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Metagpt — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/metagpt/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 20:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/metagpt/feed.xml" rel="self" type="application/rss+xml"/><item><title>MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-cmd-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-cmd-injection/</guid><description>A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, tracked as CVE-2026-5974, has been identified in FoundationAgents MetaGPT up to version 0.8.1. The vulnerability resides within the <code>Bash.run</code> function located in the <code>metagpt/tools/libs/terminal.py</code> library. An attacker can exploit this flaw by injecting malicious commands into the <code>Bash.run</code> function, leading to arbitrary OS command execution on the target system. The vulnerability is remotely exploitable, posing a significant risk. Although the developers were notified via a pull request, no patch has been released as of the publication of this brief. This vulnerability could be exploited to gain unauthorized access, escalate privileges, or compromise the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a MetaGPT instance running version 0.8.1 or earlier.</li>
<li>The attacker crafts a malicious input string containing OS commands.</li>
<li>This malicious string is passed to the <code>Bash.run</code> function in <code>metagpt/tools/libs/terminal.py</code>.</li>
<li>Due to insufficient input validation, the injected commands are not properly neutralized.</li>
<li>The <code>Bash.run</code> function executes the injected OS commands using the underlying operating system&rsquo;s shell.</li>
<li>The attacker gains the ability to execute arbitrary code on the server.</li>
<li>The attacker could then install malware, create new user accounts, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to execute arbitrary operating system commands on the server hosting the vulnerable MetaGPT instance. This could lead to complete system compromise, including data theft, malware installation, and denial-of-service attacks. Due to the nature of command injection, the impact is highly dependent on the privileges of the user account running the MetaGPT application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>Bash.run</code> function in the <code>metagpt/tools/libs/terminal.py</code> library to prevent command injection (CVE-2026-5974).</li>
<li>Monitor process creations for unusual commands executed by the MetaGPT application (see Sigma rule &ldquo;Detect Suspicious MetaGPT Bash.run Execution&rdquo;).</li>
<li>Deploy a web application firewall (WAF) to filter out potentially malicious payloads being sent to the MetaGPT application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>metagpt</category><category>cve-2026-5974</category></item><item><title>MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-command-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-command-injection/</guid><description>A remote command injection vulnerability exists in FoundationAgents MetaGPT &lt;= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>CVE-2026-5972 describes a critical OS command injection vulnerability affecting FoundationAgents MetaGPT versions up to 0.8.1. The vulnerability resides in the <code>Terminal.run_command</code> function within the <code>metagpt/tools/libs/terminal.py</code> file. This flaw allows remote attackers to inject and execute arbitrary operating system commands on the affected system. The vulnerability is remotely exploitable, meaning that attackers can trigger it over a network without requiring local access. Public exploits for this vulnerability are available, increasing the risk of widespread exploitation. The patch identified as <code>d04ffc8dc67903e8b327f78ec121df5e190ffc7b</code> addresses this vulnerability and upgrading to a patched version is highly recommended.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MetaGPT instance running a version &lt;= 0.8.1.</li>
<li>The attacker crafts a malicious request targeting the <code>Terminal.run_command</code> function.</li>
<li>The malicious request contains an OS command injection payload within the input parameters expected by <code>Terminal.run_command</code>.</li>
<li>MetaGPT processes the request, passing the attacker-controlled input to the underlying operating system&rsquo;s command interpreter without proper sanitization.</li>
<li>The operating system executes the injected command as part of the MetaGPT process, granting the attacker code execution within the server environment.</li>
<li>The attacker leverages the initial foothold to escalate privileges, potentially gaining root access or compromising other services on the system.</li>
<li>The attacker may then install malware, establish persistence, or exfiltrate sensitive data.</li>
<li>The attacker achieves their final objective, which could include data theft, denial of service, or complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, malware installation, and denial of service. Given the publicly available exploit, unpatched MetaGPT instances are at immediate risk. The vulnerability has a CVSS v3.1 score of 7.3, indicating a high level of severity. The number of victims and sectors targeted is currently unknown, but given the nature of the vulnerability, any organization using MetaGPT is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>d04ffc8dc67903e8b327f78ec121df5e190ffc7b</code> provided by FoundationAgents to remediate the vulnerability.</li>
<li>Monitor web server logs for suspicious requests targeting the MetaGPT application, specifically those containing command injection attempts (cs-uri-query, cs-method, sc-status).</li>
<li>Implement the provided Sigma rule to detect command execution originating from the MetaGPT application (logsource).</li>
<li>Review network traffic for unusual outbound connections originating from MetaGPT servers, which could indicate successful exploitation and malware installation (category: network_connection).</li>
<li>Enable and review process creation logs on MetaGPT servers to identify any unexpected child processes spawned by the MetaGPT application, as this could indicate command injection exploitation (category: process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5972</category><category>command-injection</category><category>metagpt</category></item><item><title>MetaGPT Code Injection Vulnerability (CVE-2026-5970)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-code-injection/</link><pubDate>Thu, 09 Apr 2026 18:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-code-injection/</guid><description>A code injection vulnerability, CVE-2026-5970, exists in FoundationAgents MetaGPT up to version 0.8.1, allowing remote attackers to execute arbitrary code via manipulation of the `check_solution` function in the HumanEvalBenchmark/MBPPBenchmark component.</description><content:encoded><![CDATA[<p>CVE-2026-5970 is a critical vulnerability affecting FoundationAgents MetaGPT, a framework for multi-agent systems, up to version 0.8.1. The vulnerability resides within the <code>check_solution</code> function of the <code>HumanEvalBenchmark/MBPPBenchmark</code> component. This flaw enables a remote attacker to inject and execute arbitrary code by manipulating input parameters. The vulnerability has been publicly disclosed and exploits are readily available. The maintainers of the MetaGPT project were notified via pull request but have not yet addressed the issue, increasing the risk to users of affected versions. Successful exploitation could lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable MetaGPT instance running a version &lt;= 0.8.1.</li>
<li>The attacker crafts a malicious input designed to exploit the <code>check_solution</code> function within the <code>HumanEvalBenchmark/MBPPBenchmark</code> component.</li>
<li>The attacker sends the crafted input to the MetaGPT instance, potentially via a network request or other remote interface.</li>
<li>The <code>check_solution</code> function processes the malicious input without proper sanitization.</li>
<li>The lack of input sanitization allows the attacker to inject arbitrary code.</li>
<li>The injected code is then executed within the context of the MetaGPT application.</li>
<li>Depending on the privileges of the MetaGPT process, the attacker can gain control of the system or access sensitive data.</li>
<li>The attacker may use this initial access to pivot to other systems within the network, install malware, or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5970 allows remote attackers to execute arbitrary code on systems running vulnerable versions of FoundationAgents MetaGPT. This can lead to complete system compromise, data breaches, and further malicious activities within the compromised environment. Given the nature of MetaGPT, this could potentially affect development environments, CI/CD pipelines, or even production systems where the framework is utilized, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of MetaGPT as soon as one becomes available.</li>
<li>Monitor network traffic for suspicious activity targeting MetaGPT instances, using network connection logs.</li>
<li>Implement input validation and sanitization measures within the <code>check_solution</code> function (if possible as a temporary mitigation) to prevent code injection.</li>
<li>Deploy the Sigma rule below to detect attempts to exploit this vulnerability based on suspicious process creation related to MetaGPT.</li>
<li>Review and restrict network access to MetaGPT instances to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>metagpt</category><category>cve-2026-5970</category></item><item><title>FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-metagpt-code-injection/</link><pubDate>Thu, 09 Apr 2026 18:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-metagpt-code-injection/</guid><description>A code injection vulnerability exists in FoundationAgents MetaGPT &lt;= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.</description><content:encoded><![CDATA[<p>A code injection vulnerability, identified as CVE-2026-5971, has been discovered in FoundationAgents MetaGPT versions up to 0.8.1. The vulnerability resides in the <code>ActionNode.xml_fill</code> function within the <code>metagpt/actions/action_node.py</code> file, specifically related to the XML Handler component. This flaw allows a remote attacker to inject malicious code by exploiting improper neutralization of directives in dynamically evaluated code. A proof-of-concept exploit is publicly available, increasing the likelihood of exploitation. The project maintainers were notified of the vulnerability via a pull request but have not yet addressed the issue. This poses a significant risk to systems using vulnerable versions of MetaGPT, especially those exposed to untrusted input.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a MetaGPT instance running a vulnerable version (&lt;= 0.8.1).</li>
<li>The attacker crafts malicious XML input designed to exploit the <code>ActionNode.xml_fill</code> function.</li>
<li>The attacker sends the malicious XML to the MetaGPT instance through a network request, likely via an API endpoint.</li>
<li>The <code>ActionNode.xml_fill</code> function processes the malicious XML, failing to properly neutralize directives.</li>
<li>The injected code is dynamically evaluated within the MetaGPT environment.</li>
<li>The attacker gains arbitrary code execution within the MetaGPT process, potentially escalating privileges.</li>
<li>The attacker leverages the code execution to compromise the system, potentially gaining access to sensitive data.</li>
<li>The attacker exfiltrates sensitive data or causes other damage based on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5971 can lead to arbitrary code execution on systems running vulnerable versions of FoundationAgents MetaGPT (&lt;= 0.8.1). This could allow attackers to steal sensitive information, modify system configurations, install malware, or disrupt services. The availability of a public exploit increases the likelihood of widespread attacks targeting vulnerable systems. The specific number of potential victims and targeted sectors are currently unknown, but any system running MetaGPT and processing potentially malicious XML input is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for FoundationAgents MetaGPT to address CVE-2026-5971 as soon as they are released.</li>
<li>Implement input validation and sanitization measures to prevent malicious XML from being processed by the <code>ActionNode.xml_fill</code> function.</li>
<li>Monitor web server logs for suspicious activity related to XML processing, such as unusual requests or errors. Deploy the Sigma rule <code>Detect MetaGPT XML Injection Attempt</code> to identify potential exploit attempts based on HTTP request characteristics.</li>
<li>Enable process monitoring to detect suspicious processes spawned by MetaGPT, especially those with network connections. Deploy the Sigma rule <code>Detect MetaGPT Suspicious Child Processes</code> to identify potential post-exploitation activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>vulnerability</category><category>metagpt</category><category>CVE-2026-5971</category></item></channel></rss>