CVE-2025-0868

A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.. This issue affects DocsGPT: from 0.8.1 through 0.12.0.
CVSS

No CVSS.

Configurations

No configuration.

History

03 Oct 2025, 09:15

Type Values Removed Values Added
CWE CWE-77 CWE-95
Summary
  • (es) Se ha encontrado una vulnerabilidad en DocsGPT que podría provocar la ejecución remota de código (RCE). Debido al análisis incorrecto de datos JSON mediante eval(), un atacante no autorizado podría enviar código Python arbitrario para que se ejecute a través del endpoint /api/remote. Este problema afecta a DocsGPT: desde la versión 0.8.1 hasta la 0.12.0.
Summary (en) A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0. (en) A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.. This issue affects DocsGPT: from 0.8.1 through 0.12.0.

20 Feb 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-20 12:15

Updated : 2025-10-03 09:15


NVD link : CVE-2025-0868

Mitre link : CVE-2025-0868

CVE.ORG link : CVE-2025-0868


JSON object : View

Products Affected

No product.

CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')