Home

Description

Cognee thru v0.4.0 contains a critical remote code execution vulnerability in its notebook cell execution API endpoint. The endpoint is designed to execute arbitrary Python code provided by the user, but it does so using the unsafe exec() function without any sandboxing, validation, or security controls. An attacker can exploit this by sending a specially crafted POST request containing malicious Python code to the execution endpoint. This leads to arbitrary code execution on the Cognee server with the privileges of the server process, allowing complete compromise of the system.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-12 | Updated 2026-05-15 | Assigner mitre

References

github.com/topoteretes/cognee

www.notion.so/...2026-31231-35d1e13931888178a963ef9efeb29113

cve.org (CVE-2026-31231)

nvd.nist.gov (CVE-2026-31231)

Download JSON