CWE-94

Code Injection

733 CVEs Avg CVSS 8.3 MITRE
281
CRITICAL
318
HIGH
119
MEDIUM
3
LOW
187
POC
15
KEV

Monthly

CVE-2026-6125 MEDIUM POC This Month

Remote code injection in Dromara warm-flow up to version 1.8.4 allows authenticated attackers to execute arbitrary code through the SpelHelper.parseExpression function via manipulation of listenerPath, skipCondition, or permissionFlag parameters in the Workflow Definition Handler. The vulnerability uses SpEL (Spring Expression Language) injection to achieve code execution with CVSS 6.3 severity. Publicly available exploit code exists and the flaw has been documented in the project's issue tracker.

Code Injection RCE
NVD VulDB
CVSS 4.0
5.3
EPSS
0.0%
CVE-2026-6110 MEDIUM POC PATCH This Month

Code injection in FoundationAgents MetaGPT versions up to 0.8.1 allows unauthenticated remote attackers to execute arbitrary code via the Tree-of-Thought Solver's generate_thoughts function. Publicly available exploit code exists (GitHub issue #1933), and a vendor-supplied patch is available via pull request #1946. The vulnerability requires no user interaction and has low attack complexity, with confirmed impact to confidentiality, integrity, and availability. CVSS 7.3 (High) reflects moderate impact across all CIA triad elements.

RCE Code Injection
NVD VulDB GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-40158 HIGH PATCH GHSA This Week

Arbitrary code execution in PraisonAI multi-agent system (<4.5.128) via Python sandbox escape. Incomplete AST attribute filtering allows type.__getattribute__ trampoline to bypass restrictions on __subclasses__, __globals__, and __bases__, enabling untrusted agent code to break containment. Attack requires local access and user interaction to execute malicious code. No public exploit identified at time of analysis.

RCE Python Code Injection Praisonai
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2026-40156 HIGH PATCH GHSA This Week

Arbitrary code execution occurs in PraisonAI (all versions prior to 4.5.128) when a malicious tools.py file exists in the working directory. The framework automatically imports and executes this file during startup without validation or user consent, enabling unauthenticated local attackers to execute arbitrary Python code by placing a weaponized tools.py in directories accessed by users or CI/CD pipelines. User interaction is required (running praisonai command). No public exploit identified at time of analysis.

RCE Code Injection Praisonai
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-5970 MEDIUM POC PATCH This Month

Code injection in FoundationAgents MetaGPT versions up to 0.8.1 allows unauthenticated remote attackers to execute arbitrary code through the check_solution function in HumanEvalBenchmark and MBPPBenchmark components. The vulnerability requires no user interaction and enables unauthorized access, data modification, and service disruption. Publicly available exploit code exists, disclosed via GitHub issue #1942. Vendor has not responded to early disclosure via pull request #1988 at time of analysis.

RCE Code Injection
NVD VulDB GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-5848 MEDIUM POC This Month

Code injection in JimuReport's Data Source Handler allows authenticated high-privilege users to execute arbitrary code via manipulated dbUrl parameters in the DriverManager.getConnection function (versions up to 2.3.0). The vulnerability requires high-privilege authentication but can be exploited remotely with low attack complexity; publicly available exploit code exists and the vendor has acknowledged the issue with a fix planned for an upcoming release.

Java Code Injection RCE Jimureport
NVD GitHub VulDB
CVSS 4.0
5.1
EPSS
0.1%
CVE-2026-1516 MEDIUM This Month

Authenticated users can leak IP addresses of other users viewing Code Quality reports in GitLab EE through specially crafted malicious content injection. The vulnerability affects GitLab EE versions 18.0.0 through 18.10.2, requires user interaction (report viewing), and has been patched in versions 18.8.9, 18.9.5, and 18.10.3. No public exploit code or active exploitation has been confirmed; the vulnerability was discovered and reported through the GitLab responsible disclosure program.

RCE Gitlab Code Injection
NVD VulDB
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-39881 MEDIUM This Month

Vim 9.2.0315 and earlier contains a command injection vulnerability in the netbeans interface that allows a malicious netbeans server to execute arbitrary Ex commands via unsanitized strings in defineAnnoType and specialKeys protocol messages. An authenticated local attacker with user-level privileges and ability to interact with a netbeans connection can achieve code execution with the privileges of the Vim process. The vulnerability is fixed in Vim 9.2.0316.

RCE Command Injection Code Injection Vim
NVD GitHub VulDB
CVSS 3.1
5.0
EPSS
0.1%
CVE-2026-39891 HIGH PATCH GHSA This Week

Template injection in PraisonAI Python package enables remote code execution through unescaped user input in agent-centric tools. Authenticated attackers inject malicious Jinja2 template expressions via agent instructions to execute arbitrary system commands with process privileges. The create_agent_centric_tools() function passes unsanitized user input directly to template-rendering tools under auto-approval mode, causing expressions like {{self.__init__.__globals__.__builtins__.__import__("os").system("touch /tmp/pwned")}} to execute rather than render as literal text. Affects PraisonAI pip package. No public exploit identified at time of analysis beyond proof-of-concept in advisory.

RCE Python Code Injection
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-34724 HIGH This Week

Remote code execution in Zammad open-source helpdesk system versions prior to 7.0.1 through server-side template injection in AI Agent configuration. Attackers with high-privilege administrative access who can control or influence type_enrichment_data parameters can execute arbitrary code on the server. Exploitation requires authenticated administrative credentials and user interaction. No public exploit identified at time of analysis.

RCE Code Injection
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2026-6125
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Remote code injection in Dromara warm-flow up to version 1.8.4 allows authenticated attackers to execute arbitrary code through the SpelHelper.parseExpression function via manipulation of listenerPath, skipCondition, or permissionFlag parameters in the Workflow Definition Handler. The vulnerability uses SpEL (Spring Expression Language) injection to achieve code execution with CVSS 6.3 severity. Publicly available exploit code exists and the flaw has been documented in the project's issue tracker.

Code Injection RCE
NVD VulDB
CVE-2026-6110
EPSS 0% CVSS 6.9
MEDIUM POC PATCH This Month

Code injection in FoundationAgents MetaGPT versions up to 0.8.1 allows unauthenticated remote attackers to execute arbitrary code via the Tree-of-Thought Solver's generate_thoughts function. Publicly available exploit code exists (GitHub issue #1933), and a vendor-supplied patch is available via pull request #1946. The vulnerability requires no user interaction and has low attack complexity, with confirmed impact to confidentiality, integrity, and availability. CVSS 7.3 (High) reflects moderate impact across all CIA triad elements.

RCE Code Injection
NVD VulDB GitHub
CVE-2026-40158
EPSS 0% CVSS 8.6
HIGH PATCH This Week

Arbitrary code execution in PraisonAI multi-agent system (<4.5.128) via Python sandbox escape. Incomplete AST attribute filtering allows type.__getattribute__ trampoline to bypass restrictions on __subclasses__, __globals__, and __bases__, enabling untrusted agent code to break containment. Attack requires local access and user interaction to execute malicious code. No public exploit identified at time of analysis.

RCE Python Code Injection +1
NVD GitHub
CVE-2026-40156
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Arbitrary code execution occurs in PraisonAI (all versions prior to 4.5.128) when a malicious tools.py file exists in the working directory. The framework automatically imports and executes this file during startup without validation or user consent, enabling unauthenticated local attackers to execute arbitrary Python code by placing a weaponized tools.py in directories accessed by users or CI/CD pipelines. User interaction is required (running praisonai command). No public exploit identified at time of analysis.

RCE Code Injection Praisonai
NVD GitHub
CVE-2026-5970
EPSS 0% CVSS 6.9
MEDIUM POC PATCH This Month

Code injection in FoundationAgents MetaGPT versions up to 0.8.1 allows unauthenticated remote attackers to execute arbitrary code through the check_solution function in HumanEvalBenchmark and MBPPBenchmark components. The vulnerability requires no user interaction and enables unauthorized access, data modification, and service disruption. Publicly available exploit code exists, disclosed via GitHub issue #1942. Vendor has not responded to early disclosure via pull request #1988 at time of analysis.

RCE Code Injection
NVD VulDB GitHub
CVE-2026-5848
EPSS 0% CVSS 5.1
MEDIUM POC This Month

Code injection in JimuReport's Data Source Handler allows authenticated high-privilege users to execute arbitrary code via manipulated dbUrl parameters in the DriverManager.getConnection function (versions up to 2.3.0). The vulnerability requires high-privilege authentication but can be exploited remotely with low attack complexity; publicly available exploit code exists and the vendor has acknowledged the issue with a fix planned for an upcoming release.

Java Code Injection RCE +1
NVD GitHub VulDB
CVE-2026-1516
EPSS 0% CVSS 5.7
MEDIUM This Month

Authenticated users can leak IP addresses of other users viewing Code Quality reports in GitLab EE through specially crafted malicious content injection. The vulnerability affects GitLab EE versions 18.0.0 through 18.10.2, requires user interaction (report viewing), and has been patched in versions 18.8.9, 18.9.5, and 18.10.3. No public exploit code or active exploitation has been confirmed; the vulnerability was discovered and reported through the GitLab responsible disclosure program.

RCE Gitlab Code Injection
NVD VulDB
CVE-2026-39881
EPSS 0% CVSS 5.0
MEDIUM This Month

Vim 9.2.0315 and earlier contains a command injection vulnerability in the netbeans interface that allows a malicious netbeans server to execute arbitrary Ex commands via unsanitized strings in defineAnnoType and specialKeys protocol messages. An authenticated local attacker with user-level privileges and ability to interact with a netbeans connection can achieve code execution with the privileges of the Vim process. The vulnerability is fixed in Vim 9.2.0316.

RCE Command Injection Code Injection +1
NVD GitHub VulDB
CVE-2026-39891
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Template injection in PraisonAI Python package enables remote code execution through unescaped user input in agent-centric tools. Authenticated attackers inject malicious Jinja2 template expressions via agent instructions to execute arbitrary system commands with process privileges. The create_agent_centric_tools() function passes unsanitized user input directly to template-rendering tools under auto-approval mode, causing expressions like {{self.__init__.__globals__.__builtins__.__import__("os").system("touch /tmp/pwned")}} to execute rather than render as literal text. Affects PraisonAI pip package. No public exploit identified at time of analysis beyond proof-of-concept in advisory.

RCE Python Code Injection
NVD GitHub
CVE-2026-34724
EPSS 0% CVSS 8.7
HIGH This Week

Remote code execution in Zammad open-source helpdesk system versions prior to 7.0.1 through server-side template injection in AI Agent configuration. Attackers with high-privilege administrative access who can control or influence type_enrichment_data parameters can execute arbitrary code on the server. Exploitation requires authenticated administrative credentials and user interaction. No public exploit identified at time of analysis.

RCE Code Injection
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy