제출 #782169: ScrapeGraphAI scrapegraph-ai 1.74.0 Remote Code Execution (RCE)정보

제목ScrapeGraphAI scrapegraph-ai 1.74.0 Remote Code Execution (RCE)
설명A critical Remote Code Execution vulnerability exists in the GenerateCodeNode component of ScrapeGraphAI v1.74.0. The library uses a Large Language Model (LLM) to generate Python code for data extraction from scraped web pages, then executes that code via Python's exec() built-in with a "sandbox" that exposes the full __builtins__ module, providing no actual isolation. An attacker who controls or can influence the content of a target website can embed prompt injection payloads in the HTML (e.g., within invisible HTML comments). When a victim uses ScrapeGraphAI's CodeGeneratorGraph to scrape the attacker's page, the HTML content — including the prompt injection — is fed directly into the LLM prompt. The LLM then generates Python code that may include arbitrary malicious operations (importing subprocess, executing shell commands, reading files, exfiltrating data). This code is executed via exec() with full access to Python's built-in functions, resulting in arbitrary code execution on the victim's machine.
원천⚠️ https://github.com/August829/CVEP/issues/19
사용자
 Yu Bao (UID 88956)
제출2026. 03. 18. AM 08:21 (20 날 ago)
모더레이션2026. 04. 04. AM 08:33 (17 days later)
상태수락
VulDB 항목355285 [ScrapeGraphAI scrapegraph-ai 까지 1.74.0 GenerateCodeNode generate_code_node.py create_sandbox_and_execute 권한 상승]
포인트들20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!