CVE-2025-53928
Published: 17 July 2025
Summary
CVE-2025-53928 is a medium-severity Code Injection (CWE-94) vulnerability in Maxkb Maxkb. Its CVSS base score is 4.6 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 26.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other Platforms; in the Protocol-Specific Risks risk domain.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Makes persistent code injection into loaded programs impossible when the executable image itself resides on hardware-protected read-only media.
Dynamically generated code can be produced and executed inside the isolated chamber, preventing host compromise from code-injection payloads.
Validates inputs used in dynamic code generation to block injected directives.
Directly prevents execution of attacker-supplied code written into data memory regions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote Command Execution vulnerability in MCP call enables exploitation of a public-facing application (T1190) to execute arbitrary commands using command and scripting interpreters (T1059).
NVD Description
MaxKB is an open-source AI assistant for enterprise. Prior to versions 1.10.9-lts and 2.0.0, a Remote Command Execution vulnerability exists in the MCP call. Versions 1.10.9-lts and 2.0.0 fix the issue.
Deeper analysisAI
CVE-2025-53928 is a remote command execution vulnerability (CWE-94) in MaxKB, an open-source AI assistant for enterprise. The flaw exists in the MCP call and affects versions prior to 1.10.9-lts and 2.0.0. Published on 2025-07-17, it carries a CVSS v3.1 base score of 4.6 (AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L), indicating moderate severity with network accessibility but high complexity.
Exploitation requires an attacker to have low privileges (PR:L), perform a high-complexity attack (AC:H) over the network (AV:N), and rely on user interaction (UI:R). A successful attack could result in low-impact confidentiality, integrity, and availability violations (C:L/I:L/A:L) within the unchanged scope (S:U), such as limited command execution on the affected system.
Mitigation is available via upgrades to MaxKB versions 1.10.9-lts or 2.0.0, which address the issue. Additional details are provided in the GitHub security advisory (GHSA-38q2-4mm7-qf5h) at https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-38q2-4mm7-qf5h and release notes for v2.0.0 at https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other Platforms
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- MaxKB is explicitly described as an open-source AI assistant for enterprise, matching the Enterprise AI Assistants category.