Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Assafelovic
Assafelovic gpt-researcher |
|
| Vendors & Products |
Assafelovic
Assafelovic gpt-researcher |
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T14:49:37.041Z
Reserved: 2026-04-05T19:12:42.697Z
Link: CVE-2026-5631
Updated: 2026-04-06T14:46:29.877Z
Status : Deferred
Published: 2026-04-06T07:16:01.983
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5631
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:47:18Z