GHSA-jmjf-mfhm-j3gf

Suggest an improvement
Source
https://github.com/advisories/GHSA-jmjf-mfhm-j3gf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-jmjf-mfhm-j3gf/GHSA-jmjf-mfhm-j3gf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jmjf-mfhm-j3gf
Aliases
  • CVE-2025-4032
Published
2025-04-28T21:30:43Z
Modified
2025-05-12T13:19:56.433735Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
AWorld OS Command Injection vulnerability
Details

A vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtualenvironments/terminals/shelltool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

Database specific
{
    "nvd_published_at": "2025-04-28T19:15:47Z",
    "cwe_ids": [
        "CWE-77",
        "CWE-78"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-29T15:08:09Z"
}
References

Affected packages

PyPI / aworld

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.2.1

Affected versions

0.*

0.1.0
0.1.1
0.2.0
0.2.1