Impact
An issue in Agno’s model execution component allows attackers to execute any Python code by changing the field_type parameter that is passed to eval(). The vulnerability is a code‑injection flaw (CWE-95) that can be triggered through a FunctionCall, giving the attacker full control over the Agno process. This leads to total compromise of confidentiality, integrity, and availability of the affected instance.
Affected Systems
All releases of Agno earlier than version 2.3.24 are susceptible. Any instance that processes user‑supplied FunctionCall objects exposed via APIs or web services can be targeted.
Risk and Exploitability
The CVSS score of 9.3 marks this issue as critical, and while an EPSS score is not provided, the severity indicates a high likelihood of exploitation. The flaw is not listed in CISA’s KEV catalog, but an attacker can remotely inject malicious field_type content and have it executed with the same privileges as the Agno process.
OpenCVE Enrichment
Github GHSA