Description
A security flaw has been discovered in eosphoros-ai db-gpt 0.7.5. Affected is the function importlib.machinery.SourceFileLoader.exec_module of the file /api/v1/serve/awel/flow/import of the component Flow Import Endpoint. Performing a manipulation as part of File results in code injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Code Injection
Action: Apply Patch
AI Analysis

Impact

The Flow Import Endpoint in eosphoros‑ai db‑gpt version 0.7.5 processes files by calling importlib.machinery.SourceFileLoader.exec_module. The implementation fails to properly sanitize the file input, allowing an attacker to supply a malicious file that is executed during import. This flaw is a code injection vulnerability that can be triggered remotely through the exposed endpoint. The weakness is represented by CWE-74 (Improper Handling of Input) and CWE-94 (Improper Evaluation of Code without Adequate Restriction). An attacker who succeeds can run arbitrary code on the host, compromising confidentiality, integrity, and availability.

Affected Systems

Only eosphoros‑ai db‑gpt version 0.7.5 is affected. No additional vendors or product variants are listed.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate impact. The exploit is publicly released but the likelihood of real‑world exploitation remains very low at present; the risk of accidental or opportunistic attacks exists nevertheless. The vulnerability is not listed in the CISA KEV catalog. Attackers can invoke the flaw by sending a crafted file to the /api/v1/serve/awel/flow/import endpoint from a remote location.

Generated by OpenCVE AI on April 17, 2026 at 13:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑provided patch for eosphoros‑ai db‑gpt 0.7.5 as soon as it is released.
  • Until a patch is deployed, block or remove the Flow Import endpoint from the public API, or limit access to authenticated, trusted users only.
  • Use network‑level controls such as IP whitelisting or firewall rules to restrict who can reach the vulnerable endpoint.
  • Monitor application logs for abnormal file import activity and alert on unexpected execution patterns.

Generated by OpenCVE AI on April 17, 2026 at 13:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Eosphoros-ai
Eosphoros-ai db-gpt
Vendors & Products Eosphoros-ai
Eosphoros-ai db-gpt

Mon, 02 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in eosphoros-ai db-gpt 0.7.5. Affected is the function importlib.machinery.SourceFileLoader.exec_module of the file /api/v1/serve/awel/flow/import of the component Flow Import Endpoint. Performing a manipulation as part of File results in code injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title eosphoros-ai db-gpt Flow Import Endpoint import importlib.machinery.SourceFileLoader.exec_module code injection
Weaknesses CWE-74
CWE-94
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Eosphoros-ai Db-gpt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T15:05:26.398Z

Reserved: 2026-03-01T09:39:44.943Z

Link: CVE-2026-3409

cve-icon Vulnrichment

Updated: 2026-03-02T15:04:57.338Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-02T05:16:17.450

Modified: 2026-03-02T20:30:10.923

Link: CVE-2026-3409

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:45:16Z

Weaknesses