CVE-2025-11844: CWE-643 Improper Neutralization of Data within XPath Expressions in huggingface huggingface/smolagents
CVE-2025-11844 is an XPath injection vulnerability in Hugging Face's Smolagents version 1. 20. 0, specifically in the search_item_ctrl_f function. The vulnerability arises from unsanitized user input being directly concatenated into XPath queries, allowing attackers to manipulate query logic. Exploitation can bypass search filters, access unintended DOM elements, and disrupt automated web tasks, potentially leading to information disclosure and manipulation of AI agent interactions. The flaw is fixed in version 1. 22. 0. The CVSS score is 5. 4 (medium severity), with no known exploits in the wild.
AI Analysis
Technical Summary
CVE-2025-11844 identifies an XPath injection vulnerability in the Hugging Face Smolagents software, version 1.20.0, within the function search_item_ctrl_f located in src/smolagents/vision_web_browser.py. The vulnerability stems from the direct concatenation of user-supplied input into XPath expressions without proper sanitization or escaping, classified under CWE-643 (Improper Neutralization of Data within XPath Expressions). This flaw allows an attacker to inject malicious XPath syntax, altering the intended query logic. Such manipulation can bypass search filters, access DOM elements not intended for retrieval, and disrupt automated web browsing or AI agent workflows that rely on these XPath queries. The impact includes potential information disclosure, manipulation of AI agent behavior, and compromised reliability of automated tasks. The vulnerability does not require authentication but does require user interaction to trigger the injection. The CVSS 3.0 score of 5.4 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The issue has been addressed in version 1.22.0 of Smolagents, though no public exploits have been reported to date.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those leveraging Hugging Face Smolagents in AI-driven automation, web scraping, or data extraction tasks. Exploitation could lead to unauthorized access to sensitive data embedded in web pages or automation workflows, potentially exposing confidential information. Manipulation of AI agent interactions could degrade the integrity and reliability of automated processes, affecting business operations that depend on accurate data retrieval and processing. While the vulnerability does not directly cause system downtime, disruption of automated workflows can lead to operational inefficiencies and increased risk of erroneous decision-making. Organizations in sectors such as finance, healthcare, research, and technology that utilize AI automation tools are particularly at risk. The medium severity score indicates a moderate risk that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Hugging Face Smolagents to version 1.22.0 or later, where the issue is fixed. In addition to patching, developers should implement strict input validation and sanitization routines for any user-supplied data incorporated into XPath queries, employing parameterized XPath queries or safe XPath libraries that prevent injection. Conduct thorough code reviews focusing on XPath query construction and test for injection vectors. Employ runtime monitoring to detect anomalous XPath query patterns that may indicate exploitation attempts. For organizations integrating Smolagents into larger systems, isolate the component to limit potential impact and apply the principle of least privilege to reduce data exposure. Finally, maintain an updated inventory of affected software versions and ensure rapid deployment of security updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-11844: CWE-643 Improper Neutralization of Data within XPath Expressions in huggingface huggingface/smolagents
Description
CVE-2025-11844 is an XPath injection vulnerability in Hugging Face's Smolagents version 1. 20. 0, specifically in the search_item_ctrl_f function. The vulnerability arises from unsanitized user input being directly concatenated into XPath queries, allowing attackers to manipulate query logic. Exploitation can bypass search filters, access unintended DOM elements, and disrupt automated web tasks, potentially leading to information disclosure and manipulation of AI agent interactions. The flaw is fixed in version 1. 22. 0. The CVSS score is 5. 4 (medium severity), with no known exploits in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2025-11844 identifies an XPath injection vulnerability in the Hugging Face Smolagents software, version 1.20.0, within the function search_item_ctrl_f located in src/smolagents/vision_web_browser.py. The vulnerability stems from the direct concatenation of user-supplied input into XPath expressions without proper sanitization or escaping, classified under CWE-643 (Improper Neutralization of Data within XPath Expressions). This flaw allows an attacker to inject malicious XPath syntax, altering the intended query logic. Such manipulation can bypass search filters, access DOM elements not intended for retrieval, and disrupt automated web browsing or AI agent workflows that rely on these XPath queries. The impact includes potential information disclosure, manipulation of AI agent behavior, and compromised reliability of automated tasks. The vulnerability does not require authentication but does require user interaction to trigger the injection. The CVSS 3.0 score of 5.4 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The issue has been addressed in version 1.22.0 of Smolagents, though no public exploits have been reported to date.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those leveraging Hugging Face Smolagents in AI-driven automation, web scraping, or data extraction tasks. Exploitation could lead to unauthorized access to sensitive data embedded in web pages or automation workflows, potentially exposing confidential information. Manipulation of AI agent interactions could degrade the integrity and reliability of automated processes, affecting business operations that depend on accurate data retrieval and processing. While the vulnerability does not directly cause system downtime, disruption of automated workflows can lead to operational inefficiencies and increased risk of erroneous decision-making. Organizations in sectors such as finance, healthcare, research, and technology that utilize AI automation tools are particularly at risk. The medium severity score indicates a moderate risk that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Hugging Face Smolagents to version 1.22.0 or later, where the issue is fixed. In addition to patching, developers should implement strict input validation and sanitization routines for any user-supplied data incorporated into XPath queries, employing parameterized XPath queries or safe XPath libraries that prevent injection. Conduct thorough code reviews focusing on XPath query construction and test for injection vectors. Employ runtime monitoring to detect anomalous XPath query patterns that may indicate exploitation attempts. For organizations integrating Smolagents into larger systems, isolate the component to limit potential impact and apply the principle of least privilege to reduce data exposure. Finally, maintain an updated inventory of affected software versions and ensure rapid deployment of security updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-10-16T09:30:14.323Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68f8dca32e6b0a7b0dc9bfb1
Added to database: 10/22/2025, 1:31:15 PM
Last enriched: 10/29/2025, 1:57:37 PM
Last updated: 12/3/2025, 12:55:54 PM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13342: CWE-862 Missing Authorization in shabti Frontend Admin by DynamiApps
CriticalCVE-2025-13109: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce
MediumCVE-2025-12887: CWE-862 Missing Authorization in saadiqbal Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App
MediumCVE-2025-12358: CWE-352 Cross-Site Request Forgery (CSRF) in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
MediumArizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.