Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in GPT‑Pilot Executor Enables Remote Code Execution |
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pythagora-io
Pythagora-io gpt-pilot |
|
| Vendors & Products |
Pythagora-io
Pythagora-io gpt-pilot |
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in GPT‑Pilot Executor Enables Remote Code Execution | |
| Weaknesses | CWE-78 |
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GPT-Pilot thru commit 0819827ce20346ef5f25b3fe29293cb448840565 (2025-09-03) contains a command injection vulnerability (CWE-78) in the Executor.run() method. During project execution, when the system prompts the user to confirm or modify a command to be run, it accepts free-text input without proper validation. The user-supplied input is directly passed to asyncio.create_subprocess_shell() for execution. This allows an attacker to replace the intended command with arbitrary shell commands, leading to remote code execution with the privileges of the GPT-Pilot process. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-12T18:41:25.580Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31246
Updated: 2026-05-12T18:41:20.230Z
Status : Deferred
Published: 2026-05-11T16:17:29.623
Modified: 2026-05-13T15:47:35.667
Link: CVE-2026-31246
No data.
OpenCVE Enrichment
Updated: 2026-05-12T23:45:25Z