This issue affects DocsGPT: from 0.8.1 through 0.12.0.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-77 |
Fri, 03 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0. | A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.. This issue affects DocsGPT: from 0.8.1 through 0.12.0. |
Weaknesses | CWE-95 |
Thu, 20 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Feb 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0. | |
Title | Remote Code Execution in DocsGPT | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-10-03T08:56:10.028Z
Reserved: 2025-01-30T08:24:34.707Z
Link: CVE-2025-0868

Updated: 2025-02-20T14:15:18.315Z

Status : Awaiting Analysis
Published: 2025-02-20T12:15:10.893
Modified: 2025-10-03T09:15:36.473
Link: CVE-2025-0868

No data.

Updated: 2025-07-13T11:07:26Z