CVE-2025-0868: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in Arc53 DocsGPT
A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.. This issue affects DocsGPT: from 0.8.1 through 0.12.0.
AI Analysis
Technical Summary
CVE-2025-0868 is a critical security vulnerability identified in Arc53's DocsGPT product, specifically affecting versions from 0.8.1 through 0.12.0. The root cause of this vulnerability lies in improper neutralization of directives in dynamically evaluated code, classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as 'Eval Injection'). The vulnerability arises because DocsGPT improperly parses JSON data by using Python's eval() function within its /api/remote endpoint. This unsafe use of eval() allows an unauthenticated attacker to send specially crafted JSON input containing arbitrary Python code, which the server then executes. This results in Remote Code Execution (RCE) without requiring any authentication or user interaction. The CVSS v4.0 base score is 9.3, indicating a critical severity level, with attack vector being network-based, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant threat. The lack of available patches at the time of disclosure further increases the risk for affected deployments. The vulnerability is particularly dangerous because RCE can allow attackers to fully compromise the host system, steal sensitive data, disrupt services, or pivot to other internal systems.
Potential Impact
For European organizations using DocsGPT versions 0.8.1 through 0.12.0, this vulnerability poses a severe risk. Successful exploitation could lead to full system compromise, resulting in data breaches, intellectual property theft, operational disruption, and potential lateral movement within corporate networks. Given DocsGPT's role in document processing and AI-driven content generation, attackers could manipulate or exfiltrate sensitive corporate documents or inject malicious content. The critical nature of the vulnerability means that attackers can exploit it remotely without authentication, increasing the likelihood of automated attacks and widespread compromise. This could severely impact organizations in sectors with strict data protection regulations such as GDPR, leading to legal and financial penalties. Additionally, disruption of document workflows could affect business continuity. The absence of known exploits currently provides a small window for mitigation, but the high severity demands immediate attention.
Mitigation Recommendations
Immediate mitigation steps include: 1) Disabling or restricting access to the /api/remote endpoint until a secure patch is available. 2) Implementing network-level controls such as firewall rules or API gateways to restrict inbound traffic to trusted sources only. 3) Monitoring logs for unusual or unexpected requests targeting the /api/remote endpoint, especially those containing suspicious JSON payloads. 4) If possible, upgrading to a patched version once released by Arc53. 5) As a temporary workaround, modifying the source code to replace the use of eval() with a safe JSON parser (e.g., json.loads()) to prevent code execution. 6) Conducting thorough security audits and penetration testing focused on API endpoints to detect similar unsafe coding practices. 7) Educating developers and DevOps teams about the dangers of using eval() with untrusted input to prevent recurrence. 8) Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious behaviors indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-0868: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in Arc53 DocsGPT
Description
A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.. This issue affects DocsGPT: from 0.8.1 through 0.12.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-0868 is a critical security vulnerability identified in Arc53's DocsGPT product, specifically affecting versions from 0.8.1 through 0.12.0. The root cause of this vulnerability lies in improper neutralization of directives in dynamically evaluated code, classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as 'Eval Injection'). The vulnerability arises because DocsGPT improperly parses JSON data by using Python's eval() function within its /api/remote endpoint. This unsafe use of eval() allows an unauthenticated attacker to send specially crafted JSON input containing arbitrary Python code, which the server then executes. This results in Remote Code Execution (RCE) without requiring any authentication or user interaction. The CVSS v4.0 base score is 9.3, indicating a critical severity level, with attack vector being network-based, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant threat. The lack of available patches at the time of disclosure further increases the risk for affected deployments. The vulnerability is particularly dangerous because RCE can allow attackers to fully compromise the host system, steal sensitive data, disrupt services, or pivot to other internal systems.
Potential Impact
For European organizations using DocsGPT versions 0.8.1 through 0.12.0, this vulnerability poses a severe risk. Successful exploitation could lead to full system compromise, resulting in data breaches, intellectual property theft, operational disruption, and potential lateral movement within corporate networks. Given DocsGPT's role in document processing and AI-driven content generation, attackers could manipulate or exfiltrate sensitive corporate documents or inject malicious content. The critical nature of the vulnerability means that attackers can exploit it remotely without authentication, increasing the likelihood of automated attacks and widespread compromise. This could severely impact organizations in sectors with strict data protection regulations such as GDPR, leading to legal and financial penalties. Additionally, disruption of document workflows could affect business continuity. The absence of known exploits currently provides a small window for mitigation, but the high severity demands immediate attention.
Mitigation Recommendations
Immediate mitigation steps include: 1) Disabling or restricting access to the /api/remote endpoint until a secure patch is available. 2) Implementing network-level controls such as firewall rules or API gateways to restrict inbound traffic to trusted sources only. 3) Monitoring logs for unusual or unexpected requests targeting the /api/remote endpoint, especially those containing suspicious JSON payloads. 4) If possible, upgrading to a patched version once released by Arc53. 5) As a temporary workaround, modifying the source code to replace the use of eval() with a safe JSON parser (e.g., json.loads()) to prevent code execution. 6) Conducting thorough security audits and penetration testing focused on API endpoints to detect similar unsafe coding practices. 7) Educating developers and DevOps teams about the dangers of using eval() with untrusted input to prevent recurrence. 8) Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious behaviors indicative of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-01-30T08:24:34.707Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68df90890c40395553ed987c
Added to database: 10/3/2025, 8:59:53 AM
Last enriched: 10/3/2025, 9:00:09 AM
Last updated: 10/3/2025, 9:02:04 AM
Views: 2
Related Threats
CVE-2025-0616: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Teknolojik Center Telecommunication Industry Trade Co. Ltd. B2B - Netsis Panel
HighCVE-2025-6388: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Theme-Spirit Spirit Framework
CriticalCVE-2025-61671
UnknownCVE-2025-59536: CWE-94: Improper Control of Generation of Code ('Code Injection') in anthropics claude-code
HighCVE-2025-61847
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.