Description
A vulnerability was found in ScrapeGraphAI scrapegraph-ai up to 1.74.0. The affected element is the function create_sandbox_and_execute of the file scrapegraphai/nodes/generate_code_node.py of the component GenerateCodeNode Component. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Patch now
AI Analysis

Impact

An operating system command injection flaw exists in the create_sandbox_and_execute function of the GenerateCodeNode component of ScrapeGraphAI scrapegraph-ai. By supplying crafted input, an attacker can cause arbitrary commands to be executed on the host machine, potentially compromising confidentiality, integrity, and availability. The vulnerability can be triggered remotely and has been disclosed publicly.

Affected Systems

ScrapeGraphAI scrapegraph-ai versions up to 1.74.0 are vulnerable. The flaw resides in the GenerateCodeNode component’s create_sandbox_and_execute routine.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and although the EPSS score is not available, the fact that the exploit is public and can be launched remotely raises the risk. The vulnerability is not listed in the CISA KEV catalog. Attackers can remotely invoke the vulnerable function, leading to command execution on the underlying operating system.

Generated by OpenCVE AI on April 5, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ScrapeGraphAI scrapegraph-ai to version 1.74.1 or later.
  • If an upgrade is unavailable, block network access to the GenerateCodeNode API endpoint.
  • Monitor logs for unusual command execution activity originating from the create_sandbox_and_execute function.
  • Contact ScrapeGraphAI support for additional guidance or patch information.

Generated by OpenCVE AI on April 5, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Scrapegraphai
Scrapegraphai scrapegraph-ai
Vendors & Products Scrapegraphai
Scrapegraphai scrapegraph-ai

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in ScrapeGraphAI scrapegraph-ai up to 1.74.0. The affected element is the function create_sandbox_and_execute of the file scrapegraphai/nodes/generate_code_node.py of the component GenerateCodeNode Component. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title ScrapeGraphAI scrapegraph-ai GenerateCodeNode generate_code_node.py create_sandbox_and_execute os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Scrapegraphai Scrapegraph-ai
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T17:58:29.800Z

Reserved: 2026-04-04T06:33:31.353Z

Link: CVE-2026-5532

cve-icon Vulnrichment

Updated: 2026-04-06T17:58:25.839Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T02:16:01.403

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:22Z

Weaknesses