Description
A vulnerability was detected in FoundationAgents MetaGPT up to 0.8.1. This affects the function check_solution of the component HumanEvalBenchmark/MBPPBenchmark. Performing a manipulation results in code injection. The attack may be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through a pull request but has not reacted yet.
Published: 2026-04-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Code injection via the HumanEvalBenchmark/MBPPBenchmark check_solution function
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the check_solution function of the MetaGPT project’s HumanEvalBenchmark/MBPPBenchmark component. An attacker can supply a manipulated input that causes the function to evaluate arbitrary code, resulting in code injection. This weakness is identified as CWE‑74 and CWE‑94. The impact includes the potential execution of unintended code in the context of the MetaGPT application, which could lead to unauthorized data access, data modification, or further compromise of the host system.

Affected Systems

MetaGPT versions up to 0.8.1 are affected. The vulnerability is present in the FoundationAgents MetaGPT repository under the HumanEvalBenchmark/MBPPBenchmark component. Users running any of these versions are at risk.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate severity: an attacker can remotely trigger the vulnerability without authentication. The exploit is publicly documented on GitHub and other advisory sites, but EPSS data is unavailable and it is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, likely via an API call or request to the check_solution endpoint. Exploitation requires the ability to influence the input passed to the function; no additional preconditions are documented.

Generated by OpenCVE AI on April 9, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the MetaGPT repository for a new release that addresses the check_solution code injection issue.
  • If a patch is not yet available, restrict external access to the MetaGPT service or block the check_solution endpoint until a fix is released.
  • Validate or sanitize all inputs before they reach the check_solution function to prevent execution of unintended code.
  • Monitor GitHub issues and pull requests for updates from the maintainers regarding this vulnerability.

Generated by OpenCVE AI on April 9, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Deepwisdom
Deepwisdom metagpt
CPEs cpe:2.3:a:deepwisdom:metagpt:*:*:*:*:*:*:*:*
Vendors & Products Deepwisdom
Deepwisdom metagpt

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Foundation Agents
Foundation Agents metagpt
Vendors & Products Foundation Agents
Foundation Agents metagpt

Thu, 09 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in FoundationAgents MetaGPT up to 0.8.1. This affects the function check_solution of the component HumanEvalBenchmark/MBPPBenchmark. Performing a manipulation results in code injection. The attack may be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through a pull request but has not reacted yet.
Title FoundationAgents MetaGPT HumanEvalBenchmark/MBPPBenchmark check_solution code injection
Weaknesses CWE-74
CWE-94
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Deepwisdom Metagpt
Foundation Agents Metagpt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T18:07:11.915Z

Reserved: 2026-04-09T12:04:16.831Z

Link: CVE-2026-5970

cve-icon Vulnrichment

Updated: 2026-04-09T18:07:06.052Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T18:17:04.497

Modified: 2026-04-29T19:46:47.493

Link: CVE-2026-5970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:03Z

Weaknesses