CVE-2026-5584
Published: 05 April 2026
Summary
CVE-2026-5584 is a high-severity Injection (CWE-74) vulnerability in Fosowl Agenticseek. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates code injection in PyInterpreter.execute by requiring validation and neutralization of untrusted query inputs to block special elements used for malicious code execution.
Enforces restrictions on information inputs to the query endpoint, preventing invalid or malicious payloads from reaching the vulnerable PyInterpreter.execute function.
Isolates the PyInterpreter process or execution environment, containing any injected code to prevent compromise of the broader system confidentiality, integrity, and availability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The remote code injection vulnerability in the public-facing query endpoint's PyInterpreter.execute function directly enables exploitation of public-facing applications (T1190) and arbitrary Python code execution via the scripting interpreter (T1059.006).
NVD Description
A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the function PyInterpreter.execute of the file sources/tools/PyInterpreter.py of the component query Endpoint. Such manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed…
more
to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-5584 is a code injection vulnerability affecting Fosowl agenticSeek version 0.1.0. The issue resides in the PyInterpreter.execute function within the file sources/tools/PyInterpreter.py of the query Endpoint component. Published on 2026-04-05, it is rated with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and maps to CWEs-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-94 (Improper Control of Generation of Code).
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low attack complexity. Manipulation of the affected function enables arbitrary code injection, potentially compromising confidentiality, integrity, and availability to a low degree.
Advisories from VULDB and a GitHub issue (August829/CVEP#29) document the finding, noting that the vendor was contacted early about the disclosure but provided no response. No patches or mitigations are referenced, and the exploit has been publicly disclosed, making it available for potential use.
Details
- CWE(s)