Description
A flaw has been found in OpenBMB XAgent 1.0.0. The impacted element is the function FunctionHandler.handle_tool_call of the file XAgent/function_handler.py of the component API Key Handler. This manipulation of the argument api_key causes sensitive information in log files. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-27
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Information Disclosure via Log Files
Action: Patch and Harden
AI Analysis

Impact

The vulnerability exists in OpenBMB XAgent 1.0.0 within the FunctionHandler.handle_tool_call routine. By manipulating the api_key argument, an attacker can cause the application to write sensitive data into log files. This exposes credentials or other confidential information to any party that can read the logs, fulfilling the conditions of CWE‑200 (Information Exposure). The flaw does not allow arbitrary code execution but can be leveraged to gather secrets needed for subsequent attacks.

Affected Systems

This issue affects the OpenBMB XAgent product, specifically version 1.0.0. If other unlisted versions include the same FunctionHandler implementation, they may also be vulnerable, but the only confirmed impacted version is 1.0.0.

Risk and Exploitability

With a CVSS score of 5.1, the vulnerability is classified as moderate. The attack vector is remote, and the exploit is publicly available, although an EPSS score is not provided. The vulnerability is not listed as a known exploited vulnerability in CISA's KEV catalog. Given the explanatory description, an attacker can remotely trigger the faulty logging by sending crafted input that manipulates the api_key. Those who can read the log files can obtain exposed information, directly impacting confidentiality.

Generated by OpenCVE AI on March 27, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the most recent patch for OpenBMB XAgent when it becomes available
  • Restrict permissions on log files so that only trusted services and administrators can read them
  • Configure the application to exclude sensitive fields such as api_key from log outputs
  • Turn down or disable verbose logging during production to minimize data exposure
  • Contact OpenBMB support for an official fix or additional mitigation guidance

Generated by OpenCVE AI on March 27, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in OpenBMB XAgent 1.0.0. The impacted element is the function FunctionHandler.handle_tool_call of the file XAgent/function_handler.py of the component API Key Handler. This manipulation of the argument api_key causes sensitive information in log files. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title OpenBMB XAgent API Key function_handler.py FunctionHandler.handle_tool_call log file
First Time appeared Openbmb
Openbmb xagent
Weaknesses CWE-200
CWE-532
CPEs cpe:2.3:a:openbmb:xagent:*:*:*:*:*:*:*:*
Vendors & Products Openbmb
Openbmb xagent
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T15:31:57.067Z

Reserved: 2026-03-27T08:07:45.767Z

Link: CVE-2026-4957

cve-icon Vulnrichment

Updated: 2026-03-27T15:31:38.077Z

cve-icon NVD

Status : Received

Published: 2026-03-27T15:17:03.563

Modified: 2026-03-27T15:17:03.563

Link: CVE-2026-4957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:28:20Z

Weaknesses