GHSA-JMJF-MFHM-J3GF
Vulnerability from github – Published: 2025-04-28 21:30 – Updated: 2025-05-12 12:48
VLAI?
Summary
AWorld OS Command Injection vulnerability
Details
A vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtual_environments/terminals/shell_tool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "aworld"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.2.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-4032"
],
"database_specific": {
"cwe_ids": [
"CWE-77",
"CWE-78"
],
"github_reviewed": true,
"github_reviewed_at": "2025-04-29T15:08:09Z",
"nvd_published_at": "2025-04-28T19:15:47Z",
"severity": "LOW"
},
"details": "A vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtual_environments/terminals/shell_tool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.",
"id": "GHSA-jmjf-mfhm-j3gf",
"modified": "2025-05-12T12:48:41Z",
"published": "2025-04-28T21:30:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4032"
},
{
"type": "WEB",
"url": "https://github.com/inclusionAI/AWorld/issues/38"
},
{
"type": "WEB",
"url": "https://github.com/inclusionAI/AWorld/issues/38#issue-2996574433"
},
{
"type": "WEB",
"url": "https://github.com/inclusionAI/AWorld/issues/38#issuecomment-2806190923"
},
{
"type": "PACKAGE",
"url": "https://github.com/inclusionAI/AWorld"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.306395"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.306395"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.559222"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "AWorld OS Command Injection vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…