Home

Description

Cybersecurity AI (CAI) is an open-source framework for building and deploying AI-powered offensive and defensive automation. Versions 0.5.9 and below are vulnerable to Command Injection through the run_ssh_command_with_credentials() function, which is available to AI agents. Only password and command inputs are escaped in run_ssh_command_with_credentials to prevent shell injection; while username, host and port values are injectable. This issue does not have a fix at the time of publication.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-10 | Updated 2025-12-11 | Assigner GitHub_M




CRITICAL: 9.7CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

<= 0.5.9
affected

References

github.com/...cs/cai/security/advisories/GHSA-4c65-9gqf-4w8h

github.com/...ommit/09ccb6e0baccf56c40e6cb429c698750843a999c

www.hacktivesecurity.com/...rity-ai-agent-into-pwning-itself

cve.org (CVE-2025-67511)

nvd.nist.gov (CVE-2025-67511)

Download JSON