No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 06 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T06:30:14.722Z
Reserved: 2026-04-05T19:12:42.697Z
Link: CVE-2026-5631
No data.
Status : Received
Published: 2026-04-06T07:16:01.983
Modified: 2026-04-06T07:16:01.983
Link: CVE-2026-5631
No data.
OpenCVE Enrichment
No data.