Sandbox Escape Vulnerability in MaxKB Open-Source AI Assistant
CVE-2026-39421

6.3MEDIUM

Key Information:

Vendor

1panel-dev

Status
Vendor
CVE Published:
14 April 2026

What is CVE-2026-39421?

The MaxKB open-source AI assistant for enterprise has a critical vulnerability in the ToolExecutor component, allowing authenticated attackers with workspace privileges to execute raw system calls. By exploiting the Python ctypes library, attackers can bypass security measures implemented through the LD_PRELOAD-based sandbox.so module, leading to arbitrary code execution. This vulnerability enables full network exfiltration and potential container compromise, as critical standard system functions such as execve and connect can be intercepted. Although the library attempts to restrict executable memory allocations within sandboxed Python processes, the pkey_mprotect function remains unblocked. This issue has been addressed in version 2.8.0.

Affected Version(s)

MaxKB < 2.8.0

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.