Medium severity4.3NVD Advisory· Published Apr 12, 2026· Updated Apr 29, 2026
CVE-2026-6109
CVE-2026-6109
Description
A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The impacted element is the function evaluateCode of the file metagpt/environment/minecraft/mineflayer/index.js of the component Mineflayer HTTP API. Executing a manipulation can lead to cross-site request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
metagptPyPI | <= 0.8.2 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/FoundationAgents/MetaGPT/issues/1932nvdIssue TrackingExploitMitigationWEB
- vuldb.com/submit/791759nvdExploitThird Party AdvisoryVDB EntryWEB
- github.com/advisories/GHSA-w287-wwhf-95vvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-6109ghsaADVISORY
- vuldb.com/vuln/356969nvdThird Party AdvisoryVDB EntryWEB
- vuldb.com/vuln/356969/ctinvdPermissions RequiredWEB
News mentions
0No linked articles in our index yet.