Description
A vulnerability was found in Foundation Agents MetaGPT up to 0.8.1. This vulnerability affects unknown code of the file metagpt/actions/di/write_analysis_code.py of the component DataInterpreter. The manipulation results in injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

The vulnerability allows arbitrary code injection through untrusted input handling in the DataInterpreter component's write_analysis_code.py file, leading to potential remote code execution or alteration of system behavior. The flaw is categorized under CWE-707 and CWE-74, indicating improper handling and failure to neutralize external input. Attackers could exploit this by supplying crafted data that the system executes, compromising confidentiality, integrity, and availability.

Affected Systems

Foundation Agents MetaGPT versions up to 0.8.1 are affected. The vulnerability resides in the DataInterpreter module of the MetaGPT framework, and any deployment of the software in its current form remains vulnerable until a patch or update is applied.

Risk and Exploitability

The CVSS base score of 5.3 denotes moderate severity, and no EPSS score is available. The vulnerability is not listed in CISA's KEV catalog, but an exploit is publicly available, and remote exploitation is possible. Attackers can target the system over the network by injecting malicious input, so monitoring and updates are essential.

Generated by OpenCVE AI on March 21, 2026 at 16:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify which version of Foundation Agents MetaGPT is installed.
  • If running MetaGPT 0.8.1 or earlier, upgrade to a patched version when it becomes available.
  • If immediate upgrade is not possible, restrict the DataInterpreter input to trusted sources and apply input validation to reject malicious content.
  • Regularly monitor vendor advisories and security bulletins for updates.
  • Apply any vendor-provided patch or hotfix promptly.

Generated by OpenCVE AI on March 21, 2026 at 16:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Foundation Agents
Foundation Agents metagpt
Vendors & Products Foundation Agents
Foundation Agents metagpt

Sat, 21 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Foundation Agents MetaGPT up to 0.8.1. This vulnerability affects unknown code of the file metagpt/actions/di/write_analysis_code.py of the component DataInterpreter. The manipulation results in injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Foundation Agents MetaGPT DataInterpreter write_analysis_code.py injection
Weaknesses CWE-707
CWE-74
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Foundation Agents Metagpt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T15:37:36.483Z

Reserved: 2026-03-20T14:40:30.341Z

Link: CVE-2026-4516

cve-icon Vulnrichment

Updated: 2026-03-23T15:37:32.994Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-21T15:17:11.117

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:47:10Z

Weaknesses