logo

CVE-2025-0868 docsgpt

Package

Manager: npm
Name: docsgpt
Vulnerable Version: >=0.8.1 <=0.12.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.16047 pctl0.94531

Details

DocsGPT Allows Remote Code Execution A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0.

Metadata

Created: 2025-02-20T12:31:15Z
Modified: 2025-02-20T20:18:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-9gff-5v8w-x922/GHSA-9gff-5v8w-x922.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-9gff-5v8w-x922
Finding: F422
Auto approve: 1