Description
A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
3.4.1
3.4.2
3.4.3
Timeline
| 2026-04-05: | Advisory disclosed |
| 2026-04-05: | VulDB entry created |
| 2026-04-05: | VulDB entry last update |
Credits
Yu-Bao (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/355419 (VDB-355419 | assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection)
vuldb.com/vuln/355419/cti (VDB-355419 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/785858 (Submit #785858 | assafelovic gpt-researcher 3.4.3 Unauthenticated Remote Code Execution)
github.com/assafelovic/gpt-researcher/issues/1694
github.com/assafelovic/gpt-researcher/