Description
Cybersecurity AI (CAI) is an open-source framework for building and deploying AI-powered offensive and defensive automation. Versions 0.5.9 and below are vulnerable to Command Injection through the run_ssh_command_with_credentials() function, which is available to AI agents. Only password and command inputs are escaped in run_ssh_command_with_credentials to prevent shell injection; while username, host and port values are injectable. This issue does not have a fix at the time of publication.
Published: 2025-12-10
Score: 9.7 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4c65-9gqf-4w8h Cybersecurity AI (CAI) vulnerable to Command Injection in run_ssh_command_with_credentials Agent tool
History

Tue, 17 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Aliasrobotics cybersecurity Ai
CPEs cpe:2.3:a:aliasrobotics:cybersecurity_ai:*:*:*:*:*:*:*:*
Vendors & Products Aliasrobotics cybersecurity Ai

Thu, 11 Dec 2025 17:45:00 +0000


Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Aliasrobotics
Aliasrobotics cai
Vendors & Products Aliasrobotics
Aliasrobotics cai

Thu, 11 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 23:30:00 +0000

Type Values Removed Values Added
Description Cybersecurity AI (CAI) is an open-source framework for building and deploying AI-powered offensive and defensive automation. Versions 0.5.9 and below are vulnerable to Command Injection through the run_ssh_command_with_credentials() function, which is available to AI agents. Only password and command inputs are escaped in run_ssh_command_with_credentials to prevent shell injection; while username, host and port values are injectable. This issue does not have a fix at the time of publication.
Title Cybersecurity AI (CAI) vulnerable to Command Injection in run_ssh_command_with_credentials Agent tool
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 9.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Aliasrobotics Cai Cybersecurity Ai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-11T17:22:08.701Z

Reserved: 2025-12-08T21:46:24.993Z

Link: CVE-2025-67511

cve-icon Vulnrichment

Updated: 2025-12-11T15:36:19.007Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T00:16:22.907

Modified: 2026-03-17T21:07:53.140

Link: CVE-2025-67511

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-11T16:20:16Z

Weaknesses