High severity7.3NVD Advisory· Published Apr 9, 2026· Updated Apr 29, 2026
CVE-2026-5973
CVE-2026-5973
Description
A vulnerability was found in FoundationAgents MetaGPT up to 0.8.1. Impacted is the function get_mime_type of the file metagpt/utils/common.py. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. The project was informed of the problem early through a pull request but has not reacted yet.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
metagptPyPI | <= 0.8.1 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/FoundationAgents/MetaGPT/pull/1983nvdIssue TrackingPatchWEB
- github.com/FoundationAgents/MetaGPT/issues/1930nvdIssue TrackingExploitMitigationWEB
- vuldb.com/submit/791755nvdExploitThird Party AdvisoryVDB EntryWEB
- github.com/advisories/GHSA-qw5f-qpq5-ppfgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-5973ghsaADVISORY
- vuldb.com/vuln/356527nvdThird Party AdvisoryVDB EntryWEB
- vuldb.com/vuln/356527/ctinvdPermissions RequiredWEB
News mentions
0No linked articles in our index yet.