CVE-2024-48050
Description
In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In agentscope <=v0.0.4, the is_callable_expression function uses eval() on unsanitized input, enabling unauthenticated remote code execution.
Vulnerability
In agentscope versions up to and including v0.0.4, the is_callable_expression function in agentscope\web\workstation\workflow_utils.py contains a critical security flaw. The function uses the Python eval() built-in on user-provided input without any sanitization, as seen in the line result = eval(s) [1][2][3]. This allows arbitrary Python code to be executed in the context of the server.
Exploitation
The vulnerability is remotely exploitable and does not require authentication [2]. An attacker can craft a malicious input string containing Python code that, when passed to the is_callable_expression function, is executed directly by the eval() call. The exact attack vector depends on how the function is invoked in the web workflow interface, but the unsanitized eval provides a straightforward path for code injection.
Impact
Successful exploitation grants the attacker the ability to execute arbitrary commands on the server [2][3]. This can lead to full system compromise, data exfiltration, lateral movement within the network, or further attacks. Given the lack of authentication checks required, the severity is critical.
Mitigation
As of the disclosure date (November 2024), the vulnerability exists in all versions up to and including v0.0.4, which is still the latest version [2]. No patch has been released. Users should consider disabling any online or public-facing access to the affected workflow functionality until a fix is available. The vendor has not yet acknowledged the issue, and no workaround beyond blocking external access has been published.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
agentscopePyPI | <= 0.1.0 | — |
Affected products
2- agentscope/agentscopedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-6p55-qr3j-mpgqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-48050ghsaADVISORY
- gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508dghsaWEB
- github.com/modelscope/agentscope/blob/main/src/agentscope/web/workstation/workflow_utils.pyghsaWEB
- rumbling-slice-eb0.notion.site/Unauthenticated-Remote-Code-Execution-via-The-use-of-eval-in-is_callable_expression-and-sanitize_nod-cd4ea6c576da4e0b965ef596855c298dghsaWEB
News mentions
0No linked articles in our index yet.