Server-Side Request Forgery Vulnerability in FoundationAgents MetaGPT
CVE-2026-6111
Key Information:
- Vendor
Foundationagents
- Status
- Vendor
- CVE Published:
- 12 April 2026
Badges
What is CVE-2026-6111?
A critical security flaw has been identified in FoundationAgents MetaGPT versions up to 0.8.1, affecting the decode_image function located in metagpt/utils/common.py. This vulnerability allows an attacker to manipulate the img_url_or_b64 argument, enabling a server-side request forgery (SSRF) attack. The potential for exploitation exists remotely, creating a serious risk for users of this software. As the project maintainers have not yet addressed this issue despite early notification, it is paramount for users to assess their exposure and take necessary precautions.
Affected Version(s)
MetaGPT 0.8.0
MetaGPT 0.8.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
