XML Handler Flaw in FoundationAgents MetaGPT Affects Remote Code Execution
CVE-2026-5971
Key Information:
- Vendor
Foundationagents
- Status
- Vendor
- CVE Published:
- 9 April 2026
Badges
What is CVE-2026-5971?
A vulnerability exists in FoundationAgents' MetaGPT versions up to 0.8.1, where the XML Handler's ActionNode.xml_fill function in action_node.py is susceptible to eval injection. This flaw allows an attacker to manipulate directives in dynamically evaluated code, potentially leading to unauthorized remote code execution. Although the project has been notified of this issue through an early pull request, no corrective action has been taken yet. As a result, the exploit's details are openly available, creating a significant risk for users of affected versions.
Affected Version(s)
MetaGPT 0.8.0
MetaGPT 0.8.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
