A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0.
History

Thu, 20 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Feb 2025 11:30:00 +0000

Type Values Removed Values Added
Description A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint. This issue affects DocsGPT: from 0.8.1 through 0.12.0.
Title Remote Code Execution in DocsGPT
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2025-02-20T14:15:43.457Z

Reserved: 2025-01-30T08:24:34.707Z

Link: CVE-2025-0868

cve-icon Vulnrichment

Updated: 2025-02-20T14:15:18.315Z

cve-icon NVD

Status : Received

Published: 2025-02-20T12:15:10.893

Modified: 2025-02-20T12:15:10.893

Link: CVE-2025-0868

cve-icon Redhat

No data.