Sandbox Bypass in MaxKB Open-Source AI Assistant by 1Panel
CVE-2025-53927

4.6MEDIUM

Key Information:

Vendor

1panel-dev

Status
Vendor
CVE Published:
17 July 2025

What is CVE-2025-53927?

MaxKB, an open-source AI assistant developed by 1Panel, is susceptible to a sandbox bypass vulnerability in versions prior to 2.0.0. The vulnerability arises because the system only enforces execution permissions within a designated directory. This limitation allows an attacker to exploit the shutil.copy2 method in Python to transfer malicious commands to an executable directory, circumventing existing directory restrictions. Consequently, this can lead to unauthorized command execution, including the deployment of reverse shells. Users are advised to upgrade to version 2.0.0 or later, where this issue has been addressed.

Affected Version(s)

MaxKB < 2.0.0

References

CVSS V3.1

Score:
4.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-53927 : Sandbox Bypass in MaxKB Open-Source AI Assistant by 1Panel