Metrics
Affected Vendors & Products
Thu, 30 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Berabuddies
Berabuddies agentflow |
|
| Vendors & Products |
Berabuddies
Berabuddies agentflow |
Wed, 29 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers can induce requests to the local AgentFlow API to load and execute existing Python pipeline files on disk, resulting in code execution in the context of the user running AgentFlow. | |
| Title | AgentFlow Arbitrary Python Pipeline Execution via pipeline_path | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T13:05:56.513Z
Reserved: 2026-04-29T18:30:53.906Z
Link: CVE-2026-7466
Updated: 2026-04-30T13:05:51.553Z
Status : Deferred
Published: 2026-04-29T19:16:27.013
Modified: 2026-04-30T15:44:48.290
Link: CVE-2026-7466
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:20:55Z