Description
A vulnerability was determined in modelscope agentscope up to 1.0.18. Affected by this vulnerability is the function execute_python_code/execute_shell_command of the file src/AgentScope/tool/_coding/_python.py. This manipulation causes code injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

A vulnerability exists in the execute_python_code and execute_shell_command functions of modelscope agentscope (source file src/AgentScope/tool/_coding/_python.py) that allows code injection via unsafe handling of user‑supplied input. The flaw, identified as CWE‑74 and CWE‑94, enables an attacker to inject arbitrary shell commands, effectively leading to remote code execution. The CVSS score of 6.9 reflects the severity of this remote exploitation risk. The vulnerability is not listed in the CISA KEV catalog and no EPSS value is available, yet it has been publicly disclosed, making it available to potential attackers.

Affected Systems

The affected product is modelscope agentscope up to version 1.0.18. Vendors and product details from the CNA indicate that any deployment of agentscope below version 1.0.19 is vulnerable; the specific versions in the supply chain are not enumerated beyond this upper bound.

Risk and Exploitability

The vulnerability can be exploited remotely through any interface that triggers the execute_shell_command function. No authentication or preprocessing is performed before command execution, so an attacker with network access can inject command payloads. Because the code runs with the privileges of the agent process, successful exploitation can compromise the entire host. The absence of an EPSS score leaves the actual exploitation probability uncertain, but the public disclosure and remote nature suggest a non‑negligible risk.

Generated by OpenCVE AI on April 20, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a version newer than 1.0.18 once released.
  • Restrict or disable the execute_python_code/execute_shell_command interface to users with explicit authorization, using role‑based access controls.
  • Validate and sanitize all input passed to execute_shell_command, rejecting or escaping characters that could be used for injection.

Generated by OpenCVE AI on April 20, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in modelscope agentscope up to 1.0.18. Affected by this vulnerability is the function execute_python_code/execute_shell_command of the file src/AgentScope/tool/_coding/_python.py. This manipulation causes code injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title modelscope agentscope _python.py execute_shell_command code injection
First Time appeared Modelscope
Modelscope agentscope
Weaknesses CWE-74
CWE-94
CPEs cpe:2.3:a:modelscope:agentscope:*:*:*:*:*:*:*:*
Vendors & Products Modelscope
Modelscope agentscope
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Modelscope Agentscope
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T04:00:20.462Z

Reserved: 2026-04-19T14:11:50.809Z

Link: CVE-2026-6603

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T05:16:15.353

Modified: 2026-04-20T05:16:15.353

Link: CVE-2026-6603

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T06:30:45Z

Weaknesses