Code Injection Vulnerability in Handrew BrowserPilot Affects Local Executions
CVE-2025-4218
Key Information:
- Vendor
- Handrew
- Status
- Browserpilot
- Vendor
- CVE Published:
- 2 May 2025
Badges
Summary
A code injection vulnerability has been identified in Handrew BrowserPilot affecting versions up to 0.2.51. The issue resides specifically in the GPTSeleniumAgent function of the gpt_selenium_agent.py file. By manipulating the 'instructions' argument, an attacker can execute arbitrary code on local systems. This vulnerability poses significant risks, as it has been made publicly known and can be exploited if sufficient local access is gained. Users of affected versions should prioritize upgrading to secure their systems against potential threats.
Affected Version(s)
browserpilot 0.2.0
browserpilot 0.2.1
browserpilot 0.2.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved