logo

CVE-2025-4032 aworld

Package

Manager: pip
Name: aworld
Vulnerable Version: >=0 <=0.2.1

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00403 pctl0.60113

Details

AWorld OS Command Injection vulnerability A vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtual_environments/terminals/shell_tool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

Metadata

Created: 2025-04-28T21:30:43Z
Modified: 2025-05-12T12:48:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-jmjf-mfhm-j3gf/GHSA-jmjf-mfhm-j3gf.json
CWE IDs: ["CWE-77", "CWE-78"]
Alternative ID: GHSA-jmjf-mfhm-j3gf
Finding: F422
Auto approve: 1