Description
A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through a pull request but has not reacted yet.
Published: 2026-04-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in FoundationAgents MetaGPT disables proper neutralization of directives in dynamically evaluated code within the ActionNode.xml_fill function. This code evaluation vulnerability permits arbitrary code execution when an attacker supplies crafted input. An attacker who can influence the XML payload fed to this function could gain full control of the hosting environment, compromising confidentiality, integrity, and availability of the affected application. The description confirms that the exploit is published and usable, underscoring that the risk is not theoretical.

Affected Systems

The vulnerability affects FoundationAgents MetaGPT versions up to 0.8.1. Users running any of those releases are potentially exposed. No specific patch versions are listed, but the CVE statement indicates that the component is the XML Handler in metagpt/actions/action_node.py.

Risk and Exploitability

The CVSS score of 6.9 shows a moderate to high severity, and no EPSS score is available, so precise exploitation probability is unknown. The vulnerability is not listed in CISA's KEV catalog, but the public availability of an exploit means that a remote attacker can exploit it. Given that the project has not yet responded to reported issues, the likelihood of a widespread attack remains significant, and the impact would be severe if execution succeeds.

Generated by OpenCVE AI on April 9, 2026 at 19:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patched version of MetaGPT (0.8.2 or later) if available. If a patch is not yet released, deploy the latest tested version from the official repository.

Generated by OpenCVE AI on April 9, 2026 at 19:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3ghp-8r47-4gj4 FoundationAgents MetaGPT vulnerable to eval injection
History

Wed, 29 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Deepwisdom
Deepwisdom metagpt
CPEs cpe:2.3:a:deepwisdom:metagpt:*:*:*:*:*:*:*:*
Vendors & Products Deepwisdom
Deepwisdom metagpt

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Foundation Agents
Foundation Agents metagpt
Vendors & Products Foundation Agents
Foundation Agents metagpt

Thu, 09 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through a pull request but has not reacted yet.
Title FoundationAgents MetaGPT XML action_node.py ActionNode.xml_fill eval injection
Weaknesses CWE-94
CWE-95
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Deepwisdom Metagpt
Foundation Agents Metagpt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T20:14:17.735Z

Reserved: 2026-04-09T12:04:20.721Z

Link: CVE-2026-5971

cve-icon Vulnrichment

Updated: 2026-04-13T20:14:13.475Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T18:17:04.723

Modified: 2026-04-29T19:45:53.750

Link: CVE-2026-5971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:31:46Z

Weaknesses