Cyber Posture

CVE-2026-5584

High

Published: 05 April 2026

Published
05 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0005 16.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5584 is a high-severity Injection (CWE-74) vulnerability in Fosowl Agenticseek. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates code injection in PyInterpreter.execute by requiring validation and neutralization of untrusted query inputs to block special elements used for malicious code execution.

prevent

Enforces restrictions on information inputs to the query endpoint, preventing invalid or malicious payloads from reaching the vulnerable PyInterpreter.execute function.

prevent

Isolates the PyInterpreter process or execution environment, containing any injected code to prevent compromise of the broader system confidentiality, integrity, and availability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

The remote code injection vulnerability in the public-facing query endpoint's PyInterpreter.execute function directly enables exploitation of public-facing applications (T1190) and arbitrary Python code execution via the scripting interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the function PyInterpreter.execute of the file sources/tools/PyInterpreter.py of the component query Endpoint. Such manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed…

more

to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-5584 is a code injection vulnerability affecting Fosowl agenticSeek version 0.1.0. The issue resides in the PyInterpreter.execute function within the file sources/tools/PyInterpreter.py of the query Endpoint component. Published on 2026-04-05, it is rated with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and maps to CWEs-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-94 (Improper Control of Generation of Code).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low attack complexity. Manipulation of the affected function enables arbitrary code injection, potentially compromising confidentiality, integrity, and availability to a low degree.

Advisories from VULDB and a GitHub issue (August829/CVEP#29) document the finding, noting that the vendor was contacted early about the disclosure but provided no response. No patches or mitigations are referenced, and the exploit has been publicly disclosed, making it available for potential use.

Details

CWE(s)

Affected Products

fosowl
agenticseek
0.1.0

CVEs Like This One

CVE-2026-5970Shared CWE-74, CWE-94
CVE-2026-6110Shared CWE-74, CWE-94
CVE-2026-6603Shared CWE-74, CWE-94
CVE-2025-54550Shared CWE-94
CVE-2026-2008Shared CWE-74, CWE-94
CVE-2026-24002Shared CWE-74
CVE-2026-39891Shared CWE-94
CVE-2026-25153Shared CWE-94
CVE-2026-3395Shared CWE-74, CWE-94
CVE-2026-5562Shared CWE-74, CWE-94

References