Metrics
Affected Vendors & Products
Mon, 13 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foundation Agents
Foundation Agents metagpt |
|
| Vendors & Products |
Foundation Agents
Foundation Agents metagpt |
Sun, 12 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | FoundationAgents MetaGPT common.py decode_image server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-04-12T02:30:14.605Z
Updated: 2026-04-13T12:19:44.261Z
Reserved: 2026-04-11T07:49:35.517Z
Link: CVE-2026-6111
Updated: 2026-04-13T12:19:34.891Z
Status : Awaiting Analysis
Published: 2026-04-12T03:16:08.827
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-6111
No data.