Description
A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the function PyInterpreter.execute of the file sources/tools/PyInterpreter.py of the component query Endpoint. Such manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch ASAP
AI Analysis

Impact

The flaw exists in the PyInterpreter.execute function within the query endpoint of Fosowl agenticSeek version 0.1.0. The function accepts user supplied input without proper sanitization, allowing an attacker to embed arbitrary Python code. When executed, this code runs with the privileges of the service, granting the attacker full control over the system. The vulnerability falls under CWE‑74 and CWE‑94 and results in remote code execution that can compromise confidentiality, integrity, and availability.

Affected Systems

Fosowl agenticSeek, component query endpoint, version 0.1.0. Only this specific version is known to contain the flaw at this time.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity vulnerability. EPSS is not available, and the flaw is not listed in the CISA KEV catalog, but the public disclosure and lack of a vendor response increase the likelihood of exploitation. The attack vector is remote, likely through an exposed API or service, and the code injection can be triggered by any authenticated or unauthenticated user depending on the implementation, giving attackers a clear path to compromise the affected system.

Generated by OpenCVE AI on April 5, 2026 at 19:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available patch or upgrade for Fosowl agenticSeek if one is released.
  • Disable or remove the vulnerable query endpoint from the running service.
  • Restrict network access to the service so only trusted hosts can reach it.
  • Reconfigure the application to restrict execution of arbitrary code in the PyInterpreter component.
  • Monitor logs and system activity for unexpected Python code execution or other suspicious behavior.

Generated by OpenCVE AI on April 5, 2026 at 19:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Fosowl
Fosowl agenticseek
Vendors & Products Fosowl
Fosowl agenticseek

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the function PyInterpreter.execute of the file sources/tools/PyInterpreter.py of the component query Endpoint. Such manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Fosowl agenticSeek query Endpoint PyInterpreter.py PyInterpreter.execute code injection
Weaknesses CWE-74
CWE-94
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Fosowl Agenticseek
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:50:22.623Z

Reserved: 2026-04-04T21:31:33.790Z

Link: CVE-2026-5584

cve-icon Vulnrichment

Updated: 2026-04-06T14:46:31.939Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T17:16:57.660

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5584

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:29Z

Weaknesses