Medium severity6.3NVD Advisory· Published Apr 12, 2026· Updated Apr 30, 2026
CVE-2026-6111
CVE-2026-6111
Description
A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
metagptPyPI | <= 0.8.2 | — |
Affected products
2cpe:2.3:a:deepwisdom:metagpt:0.8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:deepwisdom:metagpt:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:deepwisdom:metagpt:0.8.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/FoundationAgents/MetaGPT/pull/1941nvdIssue TrackingPatchWEB
- vuldb.com/submit/791762nvdExploitThird Party AdvisoryVDB EntryWEB
- github.com/advisories/GHSA-r5v8-c28h-f8r8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-6111ghsaADVISORY
- vuldb.com/vuln/356971nvdThird Party AdvisoryVDB EntryWEB
- github.com/FoundationAgents/MetaGPT/issues/1934nvdIssue TrackingWEB
- vuldb.com/vuln/356971/ctinvdPermissions RequiredVDB EntryWEB
News mentions
0No linked articles in our index yet.