No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foundation Agents
Foundation Agents metagpt |
|
| Vendors & Products |
Foundation Agents
Foundation Agents metagpt |
Sat, 21 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Foundation Agents MetaGPT up to 0.8.1. This affects the function code_generate of the file metagpt/ext/aflow/scripts/operator.py. The manipulation leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Foundation Agents MetaGPT operator.py code_generate code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-24T14:09:01.018Z
Reserved: 2026-03-20T14:40:24.899Z
Link: CVE-2026-4515
Updated: 2026-03-24T14:08:54.623Z
Status : Awaiting Analysis
Published: 2026-03-21T12:16:19.933
Modified: 2026-03-23T14:31:37.267
Link: CVE-2026-4515
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:49:36Z