CVE-2026-5631 PUBLISHED

assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection

Assigner: VulDB
Reserved: 05.04.2026 Published: 06.04.2026 Updated: 06.04.2026

A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor assafelovic
Product gpt-researcher
Versions
  • Version 3.4.0 is affected
  • Version 3.4.1 is affected
  • Version 3.4.2 is affected
  • Version 3.4.3 is affected

Credits

  • Yu-Bao (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Code Injection CWE
  • Injection CWE