Impact
The vulnerability is a local OS command injection in the Chat API Endpoint's shell.py. An attacker can manipulate the Message argument to execute arbitrary shell commands via the run function. This compromises the confidentiality and integrity of the local system, potentially allowing full takeover. The issue is classified as CWE-77 and CWE-78 and is rated 4.8 on the CVSS v3 scale, indicating moderate severity.
Affected Systems
Affected systems are installations of OpenAkita version 1.24.3 and earlier, all builds that include the src/openakita/tools/shell.py component remain vulnerable until a patch is applied. The vulnerable component is the Chat API Endpoint in the OpenAkita suite. No specific vendor patch has been released as of the last advisory; the vendor has not responded to the disclosure request.
Risk and Exploitability
The EPSS score of <1% and absence from the CISA KEV list suggest the likelihood of exploitation is low at present, but public exploits have been shared. The attack vector requires local access to the service, so protecting the application’s runtime privileges and tightening input validation are critical. Until an official fix is available, disabling the vulnerable endpoint or restricting local user access is recommended.
OpenCVE Enrichment