Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jfpc-wj3m-qw2m | CAI find_file Agent Tool has Command Injection Vulnerability Through Argument Injection |
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aliasrobotics
Aliasrobotics cai |
|
| Vendors & Products |
Aliasrobotics
Aliasrobotics cai |
Mon, 02 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via `subprocess.Popen()` with `shell=True`, allowing attackers to execute arbitrary commands on the host system. The `find_file()` tool executes without requiring user approval because find is considered a "safe" pre-approved command. This means an attacker can achieve Remote Code Execution (RCE) by injecting malicious arguments (like -exec) into the args parameter, completely bypassing any human-in-the-loop safety mechanisms. Commit e22a1220f764e2d7cf9da6d6144926f53ca01cde contains a fix. | |
| Title | Cybersecurity AI vulnerable to command Injection through argument injection in find_file Agent tool | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-02T18:01:06.518Z
Reserved: 2026-01-29T14:03:42.540Z
Link: CVE-2026-25130
Updated: 2026-02-02T18:01:01.143Z
Status : Deferred
Published: 2026-01-30T21:15:58.443
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-25130
No data.
OpenCVE Enrichment
Updated: 2026-04-18T01:15:05Z
Github GHSA