CVE-2026-35002
CRITICAL
9,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution.
95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Access Control
Integrity
Availability
Other
Non-Repudiation
Potential Impacts:
Read Files Or Directories
Read Application Data
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Execute Unauthorized Code Or Commands
Hide Activities
Applicable Platforms
Languages:
Interpreted, Java, JavaScript, Perl, PHP, Python, Ruby
Technologies:
AI/ML
https://github.com/agno-agi/agno/commit/cbf675521d4d2281925a051784a3b94172e56416
https://github.com/agno-agi/agno/releases/tag/v2.3.24
https://www.vulncheck.com/advisories/agno-field-type-eval-injection-arbitrary-c…