Impact
The flaw exists in the PyInterpreter.execute function within the query endpoint of Fosowl agenticSeek version 0.1.0. The function accepts user supplied input without proper sanitization, allowing an attacker to embed arbitrary Python code. When executed, this code runs with the privileges of the service, granting the attacker full control over the system. The vulnerability falls under CWE‑74 and CWE‑94 and results in remote code execution that can compromise confidentiality, integrity, and availability.
Affected Systems
Fosowl agenticSeek, component query endpoint, version 0.1.0. Only this specific version is known to contain the flaw at this time.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity vulnerability. EPSS is not available, and the flaw is not listed in the CISA KEV catalog, but the public disclosure and lack of a vendor response increase the likelihood of exploitation. The attack vector is remote, likely through an exposed API or service, and the code injection can be triggered by any authenticated or unauthenticated user depending on the implementation, giving attackers a clear path to compromise the affected system.
OpenCVE Enrichment