Impact
The flaw lies in the deserialize_message function of Foundation Agents MetaGPT, which fails to validate user‑supplied data. An attacker can send a crafted serialized payload that, when processed, triggers arbitrary code execution. The vulnerability does not require authentication, allowing any network user who can reach the service to launch an exploit that runs with the service account's privileges.
Affected Systems
Foundation Agents MetaGPT version 0.8.1 is confirmed to contain the flaw, as indicated by the CPE. It is not known whether earlier releases are affected, but it is inferred that they might also be vulnerable because the deserialization routine was unchanged before 0.8.1.
Risk and Exploitability
The CVSS base score of 9.8 signals critical severity. The EPSS score of 2% indicates a moderate likelihood of exploitation, and the absence of authentication makes the attack vector remote over the network. The vulnerability is not yet listed in the CISA KEV catalog, so no specific exploitation code is known at this time.
OpenCVE Enrichment