PT-2026-5441 · Unknown · Cybersecurity Ai

0X5T

+1

·

Published

2026-01-30

·

Updated

2026-01-31

·

CVE-2026-25130

CVSS v3.1

9.6

Critical

VectorAV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Cybersecurity AI (CAI) versions up to and including 0.5.10
Description The Cybersecurity AI (CAI) framework contains multiple argument injection vulnerabilities within its function tools. User-controlled input is directly passed to shell commands using subprocess.Popen() with shell=True, potentially allowing attackers to execute arbitrary commands on the host system. Specifically, the find file() function, located in src/cai/tools/reconnaissance/filesystem.py, is vulnerable because it executes without requiring user approval, as the find command is considered a "safe" pre-approved command. An attacker can exploit this by injecting malicious arguments, such as -exec, into the args parameter, bypassing safety mechanisms and achieving Remote Code Execution (RCE). The vulnerable command construction is: command = f'find {file path} {args}'. The file path and args variables are user-controlled inputs.
Recommendations Versions up to and including 0.5.10 should be updated to a version containing commit e22a1220f764e2d7cf9da6d6144926f53ca01cde or later. As a temporary workaround, consider restricting or disabling the use of the find file() function until a patch is applied.

Exploit

Fix

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-25130
GHSA-JFPC-WJ3M-QW2M

Affected Products

Cybersecurity Ai