A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.
This issue affects DocsGPT: from 0.8.1 through 0.12.0.
This issue affects DocsGPT: from 0.8.1 through 0.12.0.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 20 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Feb 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0. | |
Title | Remote Code Execution in DocsGPT | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-02-20T14:15:43.457Z
Reserved: 2025-01-30T08:24:34.707Z
Link: CVE-2025-0868

Updated: 2025-02-20T14:15:18.315Z

Status : Received
Published: 2025-02-20T12:15:10.893
Modified: 2025-02-20T12:15:10.893
Link: CVE-2025-0868

No data.

Updated: 2025-07-13T11:07:26Z