إرسال #782169: ScrapeGraphAI scrapegraph-ai 1.74.0 Remote Code Execution (RCE)المعلومات

عنوانScrapeGraphAI scrapegraph-ai 1.74.0 Remote Code Execution (RCE)
الوصفA critical Remote Code Execution vulnerability exists in the GenerateCodeNode component of ScrapeGraphAI v1.74.0. The library uses a Large Language Model (LLM) to generate Python code for data extraction from scraped web pages, then executes that code via Python's exec() built-in with a "sandbox" that exposes the full __builtins__ module, providing no actual isolation. An attacker who controls or can influence the content of a target website can embed prompt injection payloads in the HTML (e.g., within invisible HTML comments). When a victim uses ScrapeGraphAI's CodeGeneratorGraph to scrape the attacker's page, the HTML content — including the prompt injection — is fed directly into the LLM prompt. The LLM then generates Python code that may include arbitrary malicious operations (importing subprocess, executing shell commands, reading files, exfiltrating data). This code is executed via exec() with full access to Python's built-in functions, resulting in arbitrary code execution on the victim's machine.
المصدر⚠️ https://github.com/August829/CVEP/issues/19
المستخدم
 Yu Bao (UID 88956)
ارسال18/03/2026 08:21 AM (28 أيام منذ)
الاعتدال04/04/2026 08:33 AM (17 days later)
الحالةتمت الموافقة
إدخال VulDB355285 [ScrapeGraphAI scrapegraph-ai حتى 1.74.0 GenerateCodeNode generate_code_node.py create_sandbox_and_execute تجاوز الصلاحيات]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!