Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-77rh-m34w-rv36 | Agno is vulnerable to Eval Injection |
Thu, 16 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agno
Agno agno |
|
| CPEs | cpe:2.3:a:agno:agno:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Agno
Agno agno |
|
| Metrics |
cvssV3_1
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agno-agi
Agno-agi agno |
|
| Vendors & Products |
Agno-agi
Agno-agi agno |
|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Agno field_type Eval Injection Arbitrary Code Execution | Agno < 2.3.24 field_type Eval Injection Arbitrary Code Execution |
Thu, 02 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution. | |
| Title | Agno field_type Eval Injection Arbitrary Code Execution | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-02T15:23:20.841Z
Reserved: 2026-03-31T20:40:15.617Z
Link: CVE-2026-35002
Updated: 2026-04-02T15:23:13.911Z
Status : Analyzed
Published: 2026-04-02T15:16:52.063
Modified: 2026-04-16T17:41:17.293
Link: CVE-2026-35002
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:20:58Z
Github GHSA