CVE-2026-27952

Source
https://cve.org/CVERecord?id=CVE-2026-27952
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27952.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27952
Aliases
  • GHSA-pmgp-2m3v-34mq
Published
2026-02-26T01:38:00.760Z
Modified
2026-02-28T04:47:22.743057Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Agenta has Python Sandbox Escape, Leading to Remote Code Execution (RCE)
Details

Agenta is an open-source LLMOps platform. In Agenta-API prior to version 0.48.1, a Python sandbox escape vulnerability existed in Agenta's custom code evaluator. Agenta used RestrictedPython as a sandboxing mechanism for user-supplied evaluator code, but incorrectly whitelisted the numpy package as safe within the sandbox. This allowed authenticated users to bypass the sandbox and achieve arbitrary code execution on the API server. The escape path was through numpy.ma.core.inspect, which exposes Python's introspection utilities — including sys.modules — thereby providing access to unfiltered system-level functionality like os.system. This vulnerability affects the Agenta self-hosted platform (API server), not the SDK when used as a standalone Python library. The custom code evaluator runs server-side within the API process. The issue is fixed in v0.48.1 by removing numpy from the sandbox allowlist. In later versions (v0.60+), the RestrictedPython sandbox was removed entirely and replaced with a different execution model.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27952.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

Git / github.com/agenta-ai/agenta

Affected ranges

Type
GIT
Repo
https://github.com/agenta-ai/agenta
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "0.48.1"
        }
    ]
}

Affected versions

v0.*
v0.33.6
v0.33.7
v0.33.8
v0.34.0
v0.34.1
v0.34.2
v0.34.3
v0.34.7
v0.35.0
v0.35.1
v0.35.2
v0.36.0
v0.36.1
v0.36.4
v0.37.0
v0.37.1
v0.37.2
v0.37.3
v0.38.0
v0.38.1
v0.38.2
v0.39.0
v0.39.2
v0.39.3
v0.39.4
v0.40.0
v0.41.0
v0.41.1
v0.42.0
v0.42.1
v0.42.2
v0.43.0
v0.43.1
v0.44.4
v0.45.0
v0.45.1
v0.45.2
v0.45.3
v0.45.4
v0.46.0
v0.46.1
v0.47.0
v0.48.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27952.json"