CVE-2026-5972: FoundationAgents MetaGPT vulnerable to os command injection via the Terminal.run_command
(updated )
A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This issue affects the function Terminal.run_command in the library metagpt/tools/libs/terminal.py. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is d04ffc8dc67903e8b327f78ec121df5e190ffc7b. Applying a patch is the recommended action to fix this issue.
References
- github.com/FoundationAgents/MetaGPT
- github.com/FoundationAgents/MetaGPT/issues/1929
- github.com/advisories/GHSA-wp29-qmvj-frvp
- github.com/paipeline/MetaGPT/commit/d04ffc8dc67903e8b327f78ec121df5e190ffc7b
- nvd.nist.gov/vuln/detail/CVE-2026-5972
- vuldb.com/submit/791745
- vuldb.com/vuln/356526
- vuldb.com/vuln/356526/cti
Code Behaviors & Features
Detect and mitigate CVE-2026-5972 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →