We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in handrew browserpilot up to 0.2.51. It has been declared as critical. Affected by this vulnerability is the function GPTSeleniumAgent of the file browserpilot/browserpilot/agents/gpt_selenium_agent.py. The manipulation of the argument instructions leads to code injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
In handrew browserpilot bis 0.2.51 wurde eine kritische Schwachstelle ausgemacht. Es geht um die Funktion GPTSeleniumAgent der Datei browserpilot/browserpilot/agents/gpt_selenium_agent.py. Durch das Beeinflussen des Arguments instructions mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
2025-05-02: | Advisory disclosed |
2025-05-02: | VulDB entry created |
2025-05-02: | VulDB entry last update |
ybdesire (VulDB User)
vuldb.com/?id.307195 (VDB-307195 | handrew browserpilot gpt_selenium_agent.py GPTSeleniumAgent code injection)
vuldb.com/?ctiid.307195 (VDB-307195 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.562383 (Submit #562383 | handrew browserpilot 0.0 Code Injection)
github.com/handrew/browserpilot/issues/20
github.com/handrew/browserpilot/issues/20
Support options