CVE-2024-48050

In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.
Configurations

Configuration 1 (hide)

cpe:2.3:a:modelscope:agentscope:*:*:*:*:*:*:*:*

History

04 Sep 2025, 16:26

Type Values Removed Values Added
First Time Modelscope agentscope
Modelscope
References () https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d - () https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d - Third Party Advisory, Exploit
References () https://rumbling-slice-eb0.notion.site/Unauthenticated-Remote-Code-Execution-via-The-use-of-eval-in-is_callable_expression-and-sanitize_nod-cd4ea6c576da4e0b965ef596855c298d - () https://rumbling-slice-eb0.notion.site/Unauthenticated-Remote-Code-Execution-via-The-use-of-eval-in-is_callable_expression-and-sanitize_nod-cd4ea6c576da4e0b965ef596855c298d - Exploit, Third Party Advisory
CPE cpe:2.3:a:modelscope:agentscope:*:*:*:*:*:*:*:*

Information

Published : 2024-11-04 23:15

Updated : 2025-09-04 16:26


NVD link : CVE-2024-48050

Mitre link : CVE-2024-48050

CVE.ORG link : CVE-2024-48050


JSON object : View

Products Affected

modelscope

  • agentscope
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')