CVE-2026-25130
Description
Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via subprocess.Popen() with shell=True, allowing attackers to execute arbitrary commands on the host system. The find_file() tool executes without requiring user approval because find is considered a "safe" pre-approved command. This means an attacker can achieve Remote Code Execution (RCE) by injecting malicious arguments (like -exec) into the args parameter, completely bypassing any human-in-the-loop safety mechanisms. Commit e22a1220f764e2d7cf9da6d6144926f53ca01cde contains a fix.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cai-frameworkPyPI | <= 0.5.10 | — |
Affected products
1- Range: 0.5.6, 0.5.7, 0.5.8, …
Patches
11 file changed · +13 −0
src/cai/tools/reconnaissance/filesystem.py+13 −0 modified@@ -5,6 +5,14 @@ from cai.tools.common import run_command # pylint: disable=E0401 from cai.sdk.agents import function_tool +# Dangerous flags that enable RCE, file writes, or file deletion +DANGEROUS_FIND_FLAGS = { + "-exec", "-execdir", "-ok", "-okdir", + "-delete", + "-fprintf", "-fprint", "-fls", "-fprint0", + "-print0", +} + @function_tool def list_dir(path: str, args: str = "", ctf=None) -> str: """ @@ -61,5 +69,10 @@ def find_file(file_path: str, args: str = "", ctf=None) -> str: """ Find a file in the filesystem. """ + # Block dangerous flags that enable RCE, file writes, or deletion + for flag in DANGEROUS_FIND_FLAGS: + if flag in args: + return f"Error: DANGEROUS flag '{flag}' is not allowed" + command = f'find {file_path} {args}' return run_command(command, ctf=ctf)
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-jfpc-wj3m-qw2mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25130ghsaADVISORY
- github.com/aliasrobotics/cai/blob/559de8fcbc2b44f3b0360f35ffdc2bb975e7d7e4/src/cai/tools/reconnaissance/filesystem.pynvdWEB
- github.com/aliasrobotics/cai/commit/e22a1220f764e2d7cf9da6d6144926f53ca01cdenvdWEB
- github.com/aliasrobotics/cai/security/advisories/GHSA-jfpc-wj3m-qw2mnvdWEB
News mentions
0No linked articles in our index yet.