Impact
The flaw lies in several evaluation functions within the local_python_executor.py module of Huggingface's Smolagents package, specifically evaluate_augassign, evaluate_call, and evaluate_with. An attacker who can supply crafted input to these functions can trigger arbitrary code execution, causing the program to run malicious code. This attack vector is made possible by an incomplete remediation of a prior CWE-74 vulnerability, leading to a code injection exposure. The vulnerability is classified as a CWE-94: Uncontrolled Modification of Control Flow.
Affected Systems
Only the Huggingface Smolagents component is affected, specifically version 1.25.0.dev0. No other versions or products are indicated as impacted in the provided data.
Risk and Exploitability
The vulnerability scores a CVSS 5.3, indicating moderate severity, and no EPSS score is available. The vulnerability is not listed in CISA's KEV catalog. Based on the description, the attack vector is inferred to be remote, likely through publicly exposed API calls to the Smolagents service. An attacker who can trigger the vulnerable functions can execute arbitrary code, potentially compromising confidentiality, integrity, and availability of the host system.
OpenCVE Enrichment