Home

Description

Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command injection vulnerability in the _extractLLM() function allows attackers to execute arbitrary shell commands on the server. The function constructs a curl command using string concatenation and passes it to execSync() without proper sanitization, enabling remote code execution when the corpus parameter contains shell metacharacters. This issue has been patched in version 1.69.3.

PUBLISHED Reserved 2026-04-23 | Published 2026-05-04 | Updated 2026-05-05 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 1.69.3
affected

References

github.com/...volver/security/advisories/GHSA-j5w5-568x-rq53 exploit

github.com/...volver/security/advisories/GHSA-j5w5-568x-rq53

github.com/EvoMap/evolver/releases/tag/v1.69.3

cve.org (CVE-2026-42076)

nvd.nist.gov (CVE-2026-42076)

Download JSON