MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0 | Release Notes |
| https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-5xhm-4j3v-87m4 | Vendor Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-07-17 14:15
Updated : 2025-08-02 01:34
NVD link : CVE-2025-53927
Mitre link : CVE-2025-53927
CVE.ORG link : CVE-2025-53927
JSON object : View
Products Affected
maxkb
- maxkb
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
