| 제목 | ScrapeGraphAI scrapegraph-ai 1.74.0 Remote Code Execution (RCE) |
|---|
| 설명 | A critical Remote Code Execution vulnerability exists in the GenerateCodeNode component of ScrapeGraphAI v1.74.0. The library uses a Large Language Model (LLM) to generate Python code for data extraction from scraped web pages, then executes that code via Python's exec() built-in with a "sandbox" that exposes the full __builtins__ module, providing no actual isolation.
An attacker who controls or can influence the content of a target website can embed prompt injection payloads in the HTML (e.g., within invisible HTML comments). When a victim uses ScrapeGraphAI's CodeGeneratorGraph to scrape the attacker's page, the HTML content — including the prompt injection — is fed directly into the LLM prompt. The LLM then generates Python code that may include arbitrary malicious operations (importing subprocess, executing shell commands, reading files, exfiltrating data). This code is executed via exec() with full access to Python's built-in functions, resulting in arbitrary code execution on the victim's machine. |
|---|
| 원천 | ⚠️ https://github.com/August829/CVEP/issues/19 |
|---|
| 사용자 | Yu Bao (UID 88956) |
|---|
| 제출 | 2026. 03. 18. AM 08:21 (20 날 ago) |
|---|
| 모더레이션 | 2026. 04. 04. AM 08:33 (17 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 355285 [ScrapeGraphAI scrapegraph-ai 까지 1.74.0 GenerateCodeNode generate_code_node.py create_sandbox_and_execute 권한 상승] |
|---|
| 포인트들 | 20 |
|---|