Impact
The flaw lies in the Mineflayer HTTP API’s evaluateCode function, allowing a remote attacker to trick a legitimate user into executing arbitrary code. This cross‑site request forgery can result in the unauthorized execution of commands through the API, compromising the integrity of Minecraft server processes and potentially enabling further intrusions.
Affected Systems
Affected deployments run FoundationAgents MetaGPT versions 0.8.1 or earlier. All users of these versions must assess exposure as no earlier versions are documented as safe.
Risk and Exploitability
The vulnerability scores 5.3 on CVSS, indicating a medium impact when combined with remote access. The EPSS score is unavailable and the issue is not in CISA’s KEV catalog. Attackers can exploit this by sending crafted HTTP requests to the evaluateCode endpoint from any network location. Although the CVE notes that the vulnerability is publicly disclosed, no official patch exists yet, raising the risk for active exploitation.
OpenCVE Enrichment
Github GHSA