CVE-2026-25130: CAI find_file Agent Tool has Command Injection Vulnerability Through Argument Injection
(updated )
The CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via subprocess.Popen() with shell=True, allowing attackers to execute arbitrary commands on the host system.
References
- github.com/advisories/GHSA-jfpc-wj3m-qw2m
- github.com/aliasrobotics/cai
- github.com/aliasrobotics/cai/blob/559de8fcbc2b44f3b0360f35ffdc2bb975e7d7e4/src/cai/tools/reconnaissance/filesystem.py
- github.com/aliasrobotics/cai/commit/e22a1220f764e2d7cf9da6d6144926f53ca01cde
- github.com/aliasrobotics/cai/security/advisories/GHSA-jfpc-wj3m-qw2m
- nvd.nist.gov/vuln/detail/CVE-2026-25130
Code Behaviors & Features
Detect and mitigate CVE-2026-25130 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →