CVE-2026-27961

Source
https://cve.org/CVERecord?id=CVE-2026-27961
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27961.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27961
Aliases
  • GHSA-cfr2-mp74-3763
Published
2026-02-26T01:39:09.997Z
Modified
2026-02-28T04:47:21.491706Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Agenta's Server-Side Template Injection (SSTI) via custom evaluator Jinja2 templates allows RCE
Details

Agenta is an open-source LLMOps platform. A Server-Side Template Injection (SSTI) vulnerability exists in versions prior to 0.86.8 in Agenta's API server evaluator template rendering. Although the vulnerable code lives in the SDK package, it is executed server-side within the API process when running evaluators. This does not affect standalone SDK usage — it only impacts self-hosted or managed Agenta platform deployments. Version 0.86.8 contains a fix for the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27961.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-1336"
    ]
}
References

Affected packages

Git / github.com/agenta-ai/agenta

Affected ranges

Type
GIT
Repo
https://github.com/agenta-ai/agenta
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "0.86.8"
        }
    ]
}

Affected versions

48.*
48.5
v0.*
v0.33.6
v0.33.7
v0.33.8
v0.34.0
v0.34.1
v0.34.2
v0.34.3
v0.34.7
v0.35.0
v0.35.1
v0.35.2
v0.36.0
v0.36.1
v0.36.4
v0.37.0
v0.37.1
v0.37.2
v0.37.3
v0.38.0
v0.38.1
v0.38.2
v0.39.0
v0.39.2
v0.39.3
v0.39.4
v0.40.0
v0.41.0
v0.41.1
v0.42.0
v0.42.1
v0.42.2
v0.43.0
v0.43.1
v0.44.4
v0.45.0
v0.45.1
v0.45.2
v0.45.3
v0.45.4
v0.46.0
v0.46.1
v0.47.0
v0.48.0
v0.48.1
v0.48.10
v0.48.2
v0.48.3
v0.48.4
v0.48.6
v0.48.7
v0.48.9
v0.49.0
v0.49.1
v0.49.2
v0.49.3
v0.49.5
v0.50.2
v0.50.3
v0.50.4
v0.50.5
v0.50.6
v0.51.0
v0.51.1
v0.51.6
v0.52.4
v0.52.5
v0.52.6
v0.52.7
v0.52.8
v0.53.0
v0.54.0
v0.54.1
v0.55.0
v0.55.1
v0.55.2
v0.56.0
v0.56.1
v0.56.2
v0.56.3
v0.56.4
v0.57.0
v0.57.1
v0.57.2
v0.58.0
v0.59.0
v0.59.1
v0.59.10
v0.59.11
v0.59.12
v0.59.2
v0.59.3
v0.59.4
v0.59.5
v0.59.6
v0.59.7
v0.59.8
v0.59.9
v0.60.0
v0.60.1
v0.60.2
v0.61.0
v0.61.1
v0.61.2
v0.62.1
v0.62.2
v0.62.3
v0.62.4
v0.62.5
v0.62.6
v0.62.7
v0.62.8
v0.62.9
v0.63.0
v0.63.1
v0.63.2
v0.64.0
v0.64.1
v0.64.2
v0.65.0
v0.65.1
v0.66.0
v0.66.1
v0.66.2
v0.67.0
v0.68.0
v0.68.1
v0.68.2
v0.68.3
v0.68.4
v0.68.5
v0.69.0
v0.69.1
v0.69.2
v0.69.3
v0.69.4
v0.69.5
v0.69.6
v0.69.7
v0.69.8
v0.70.0
v0.70.1
v0.71.0
v0.71.1
v0.72.0
v0.72.1
v0.72.2
v0.72.3
v0.72.4
v0.73.0
v0.74.0
v0.75.0
v0.75.1
v0.76.0
v0.77.0
v0.77.1
v0.77.2
v0.77.3
v0.77.4
v0.78.0
v0.78.1
v0.79.0
v0.79.1
v0.80.0
v0.80.1
v0.80.2
v0.80.3
v0.80.4
v0.80.5
v0.80.6
v0.80.7
v0.80.8
v0.80.9
v0.81.0
v0.81.1
v0.81.2
v0.82.0
v0.83.0
v0.83.1
v0.84.0
v0.84.1
v0.85.0
v0.85.1
v0.85.2
v0.85.3
v0.85.4
v0.85.5
v0.85.6
v0.86.0
v0.86.1
v0.86.2
v0.86.3
v0.86.4
v0.86.5
v0.86.6
v0.86.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27961.json"