Описание
A vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtual_environments/terminals/shell_tool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
Ссылки
- ExploitIssue Tracking
- ExploitIssue Tracking
- ExploitIssue Tracking
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 2025-04-24 (включая)
cpe:2.3:a:inclusionai:aworld:*:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00473
Низкий
5 Medium
CVSS3
8.1 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-77
CWE-78
Связанные уязвимости
EPSS
Процентиль: 64%
0.00473
Низкий
5 Medium
CVSS3
8.1 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-77
CWE-78