Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48050: n/a

0
Critical
VulnerabilityCVE-2024-48050cvecve-2024-48050
Published: Mon Nov 04 2024 (11/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:35:41 UTC

Technical Analysis

CVE-2024-48050 is a critical vulnerability identified in the agentscope software, specifically in versions up to 0.0.4. The flaw exists in the is_callable_expression function located in the file agentscope\web\workstation\workflow_utils.py, where the Python eval() function is used to evaluate a string input 's'. Because eval() executes the passed string as Python code, if this input is user-controlled and not properly sanitized, it can lead to arbitrary code execution. This means an attacker can remotely execute any Python code on the affected system without authentication or user interaction, leading to full system compromise. The vulnerability is classified under CWE-94, which pertains to improper control of code generation or execution. The CVSS v3.1 score of 9.8 (critical) reflects the vulnerability's high exploitability (network vector, no privileges required, no user interaction) and severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the presence of eval() on user input is a well-known risky practice, making this vulnerability highly exploitable in practice. The lack of available patches at the time of publication increases the urgency for organizations to implement mitigations or upgrade once fixes are released.

Potential Impact

The impact of CVE-2024-48050 is severe for organizations using affected versions of agentscope. Successful exploitation allows remote attackers to execute arbitrary code with the privileges of the agentscope process, potentially leading to full system compromise. This can result in unauthorized data access, data modification or deletion, installation of persistent malware, lateral movement within networks, and disruption of services. Because the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing the risk of widespread damage. Organizations relying on agentscope for workflow automation or system management may face operational outages and data breaches. The critical severity and network exploitability make this a high-priority threat for cybersecurity teams worldwide.

Mitigation Recommendations

To mitigate CVE-2024-48050, organizations should immediately audit their use of agentscope and identify any deployments running versions up to 0.0.4. Until an official patch is released, the following specific actions are recommended: 1) Disable or restrict access to the vulnerable is_callable_expression function or the affected workflow_utils.py module to prevent processing of untrusted input; 2) Implement input validation and sanitization to ensure that any input passed to eval() or similar functions is strictly controlled or avoided; 3) Replace the use of eval() with safer alternatives such as ast.literal_eval() if only literals need to be parsed; 4) Employ runtime application self-protection (RASP) or web application firewalls (WAFs) to detect and block suspicious payloads targeting this vulnerability; 5) Monitor logs and network traffic for anomalous activity indicative of exploitation attempts; 6) Plan for an immediate upgrade to a patched version once available; 7) Conduct code reviews and security testing to identify and remediate similar unsafe coding patterns elsewhere in the codebase.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d09b7ef31ef0b56d653

Added to database: 2/25/2026, 9:43:37 PM

Last enriched: 2/28/2026, 7:35:41 AM

Last updated: 4/12/2026, 11:47:46 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses