Cyber Posture

CVE-2026-5973

High

Published: 09 April 2026

Published
09 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0048 65.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5973 is a high-severity Command Injection (CWE-77) vulnerability. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 34.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the unpatched OS command injection flaw in MetaGPT's get_mime_type function.

prevent

Implements input validation mechanisms to block malicious input manipulations that trigger OS command injection in the vulnerable function.

detect

Enables vulnerability scanning to identify the presence of CVE-2026-5973 in MetaGPT versions up to 0.8.1 for subsequent remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

OS command injection in a remotely accessible function of MetaGPT enables unauthenticated remote attackers to execute arbitrary OS commands, directly mapping to exploitation of public-facing applications (T1190) and command/scripting interpreter usage for execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was found in FoundationAgents MetaGPT up to 0.8.1. Impacted is the function get_mime_type of the file metagpt/utils/common.py. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could…

more

be used. The project was informed of the problem early through a pull request but has not reacted yet.

Deeper analysisAI

CVE-2026-5973 is an OS command injection vulnerability affecting FoundationAgents MetaGPT versions up to 0.8.1. The issue resides in the get_mime_type function within the file metagpt/utils/common.py, where manipulation of inputs leads to arbitrary OS command execution. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and is associated with CWEs 77 and 78.

The vulnerability is remotely exploitable by unauthenticated attackers with network access, requiring low complexity and no user interaction. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, enabling command injection on the host system running the affected MetaGPT instance.

Advisories reference an open GitHub issue (#1930) and a pull request (#1983) submitted to the MetaGPT repository, indicating the project was informed early but has not yet responded or issued patches. No official mitigations or fixes are available as of the CVE publication on 2026-04-09.

The exploit has been made public and could be used in attacks, with details available via VulDB entries. MetaGPT, as a multi-agent framework, has relevance to AI/ML workflows where such utilities might process file types insecurely.

Details

CWE(s)

CVEs Like This One

CVE-2025-1676Shared CWE-77, CWE-78
CVE-2026-2184Shared CWE-77, CWE-78
CVE-2025-59740Shared CWE-77, CWE-78
CVE-2025-1536Shared CWE-77, CWE-78
CVE-2026-4585Shared CWE-77, CWE-78
CVE-2026-4170Shared CWE-77, CWE-78
CVE-2026-2952Shared CWE-77, CWE-78
CVE-2025-1546Shared CWE-77, CWE-78
CVE-2026-7590Shared CWE-77, CWE-78
CVE-2026-5972Shared CWE-77, CWE-78

References