Description
A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

A flaw in the function that extracts command data from arguments in the backend server of the gpt-researcher application allows a malicious actor to inject arbitrary code. The injection occurs when attacker-controlled input is passed to the server endpoint, resulting in execution of unintended commands. This could compromise the confidentiality, integrity, and availability of the host system.

Affected Systems

The vulnerability affects versions of assafelovic's gpt-researcher up to and including 3.4.3. No later releases are confirmed to be fixed in the provided data.

Risk and Exploitability

The CVSS base score of 6.9 indicates a significant risk level. Though no EPSS score is available and the flaw is not listed in CISA's KEV catalog, the public disclosure and the ability to trigger the issue from a remote source suggest that an attacker could exploit the flaw without local privileges. The attack likely requires sending crafted payloads to the websocket endpoint’s extract_command_data function, which the application currently sanitizes inadequately. Without an official patch, the risk remains present until mitigation steps are applied.

Generated by OpenCVE AI on April 6, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a version newer than 3.4.3 once released by the vendor.
  • If an update is not yet available, disable or remove the vulnerable websocket endpoint from the deployment.
  • Monitor logs for unusual command execution patterns and network traffic indicating attempts to exploit the extraction routine.
  • Contact the maintainer to request an expedited fix or advisory on interim hardening measures.

Generated by OpenCVE AI on April 6, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Assafelovic
Assafelovic gpt-researcher
Vendors & Products Assafelovic
Assafelovic gpt-researcher

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection
Weaknesses CWE-74
CWE-94
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Assafelovic Gpt-researcher
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:49:37.041Z

Reserved: 2026-04-05T19:12:42.697Z

Link: CVE-2026-5631

cve-icon Vulnrichment

Updated: 2026-04-06T14:46:29.877Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T07:16:01.983

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5631

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:18Z

Weaknesses