CVE-2025-53928: CWE-94: Improper Control of Generation of Code ('Code Injection') in 1Panel-dev MaxKB
MaxKB is an open-source AI assistant for enterprise. Prior to versions 1.10.9-lts and 2.0.0, a Remote Command Execution vulnerability exists in the MCP call. Versions 1.10.9-lts and 2.0.0 fix the issue.
AI Analysis
Technical Summary
CVE-2025-53928 is a remote command execution vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as code injection) affecting the open-source AI assistant product MaxKB developed by 1Panel-dev. This vulnerability exists in the MCP call functionality of MaxKB versions prior to 1.10.9-lts and 2.0.0. The flaw allows an attacker with low privileges and requiring user interaction to execute arbitrary commands remotely by injecting malicious code into the system. The vulnerability arises due to insufficient validation or sanitization of inputs that are used to generate or execute code dynamically, enabling attackers to manipulate the code generation process and execute unintended commands. The CVSS v3.1 base score is 4.6 (medium severity), reflecting that the attack vector is network-based (AV:N), but requires high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The impact on confidentiality, integrity, and availability is low to medium, indicating limited but non-negligible damage potential. The vulnerability has been addressed in MaxKB versions 1.10.9-lts and 2.0.0, and users are strongly advised to upgrade to these patched versions to mitigate the risk. No known exploits are currently reported in the wild, but the presence of a remote code execution vector in an AI assistant used in enterprise environments warrants proactive remediation and monitoring.
Potential Impact
For European organizations, the presence of this vulnerability in MaxKB could lead to unauthorized remote command execution, potentially allowing attackers to execute arbitrary commands within the context of the vulnerable application. Although the CVSS score indicates medium severity, the impact could be significant depending on how MaxKB is integrated within enterprise environments, especially if it has access to sensitive data or critical systems. Exploitation could lead to partial compromise of system integrity, unauthorized data access, or disruption of AI assistant services, which may affect business operations and data confidentiality. Given that MaxKB is an AI assistant designed for enterprise use, organizations relying on it for workflow automation or decision support could face operational risks. The requirement for user interaction and low privileges reduces the likelihood of widespread exploitation but does not eliminate targeted attacks, especially in environments where social engineering or phishing could be used to trigger the vulnerability. European organizations should consider the potential for lateral movement or privilege escalation if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Immediate upgrade to MaxKB versions 1.10.9-lts or 2.0.0, which contain the patches addressing this vulnerability. 2. Implement strict input validation and sanitization on all user inputs and API calls related to the MCP functionality to prevent code injection attempts. 3. Restrict network access to MaxKB management interfaces and MCP endpoints using network segmentation, firewalls, and access control lists to limit exposure to untrusted networks. 4. Employ application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious command injection patterns. 5. Conduct regular security audits and code reviews focusing on dynamic code generation or execution features within MaxKB or similar AI assistant tools. 6. Educate users on the risks of social engineering and the importance of cautious interaction with prompts or commands that could trigger code execution. 7. Monitor logs and system behavior for unusual command execution or anomalies that could indicate exploitation attempts. 8. If feasible, run MaxKB with the least privileges necessary and isolate it within containerized or sandboxed environments to reduce the blast radius of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-53928: CWE-94: Improper Control of Generation of Code ('Code Injection') in 1Panel-dev MaxKB
Description
MaxKB is an open-source AI assistant for enterprise. Prior to versions 1.10.9-lts and 2.0.0, a Remote Command Execution vulnerability exists in the MCP call. Versions 1.10.9-lts and 2.0.0 fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-53928 is a remote command execution vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as code injection) affecting the open-source AI assistant product MaxKB developed by 1Panel-dev. This vulnerability exists in the MCP call functionality of MaxKB versions prior to 1.10.9-lts and 2.0.0. The flaw allows an attacker with low privileges and requiring user interaction to execute arbitrary commands remotely by injecting malicious code into the system. The vulnerability arises due to insufficient validation or sanitization of inputs that are used to generate or execute code dynamically, enabling attackers to manipulate the code generation process and execute unintended commands. The CVSS v3.1 base score is 4.6 (medium severity), reflecting that the attack vector is network-based (AV:N), but requires high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The impact on confidentiality, integrity, and availability is low to medium, indicating limited but non-negligible damage potential. The vulnerability has been addressed in MaxKB versions 1.10.9-lts and 2.0.0, and users are strongly advised to upgrade to these patched versions to mitigate the risk. No known exploits are currently reported in the wild, but the presence of a remote code execution vector in an AI assistant used in enterprise environments warrants proactive remediation and monitoring.
Potential Impact
For European organizations, the presence of this vulnerability in MaxKB could lead to unauthorized remote command execution, potentially allowing attackers to execute arbitrary commands within the context of the vulnerable application. Although the CVSS score indicates medium severity, the impact could be significant depending on how MaxKB is integrated within enterprise environments, especially if it has access to sensitive data or critical systems. Exploitation could lead to partial compromise of system integrity, unauthorized data access, or disruption of AI assistant services, which may affect business operations and data confidentiality. Given that MaxKB is an AI assistant designed for enterprise use, organizations relying on it for workflow automation or decision support could face operational risks. The requirement for user interaction and low privileges reduces the likelihood of widespread exploitation but does not eliminate targeted attacks, especially in environments where social engineering or phishing could be used to trigger the vulnerability. European organizations should consider the potential for lateral movement or privilege escalation if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Immediate upgrade to MaxKB versions 1.10.9-lts or 2.0.0, which contain the patches addressing this vulnerability. 2. Implement strict input validation and sanitization on all user inputs and API calls related to the MCP functionality to prevent code injection attempts. 3. Restrict network access to MaxKB management interfaces and MCP endpoints using network segmentation, firewalls, and access control lists to limit exposure to untrusted networks. 4. Employ application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious command injection patterns. 5. Conduct regular security audits and code reviews focusing on dynamic code generation or execution features within MaxKB or similar AI assistant tools. 6. Educate users on the risks of social engineering and the importance of cautious interaction with prompts or commands that could trigger code execution. 7. Monitor logs and system behavior for unusual command execution or anomalies that could indicate exploitation attempts. 8. If feasible, run MaxKB with the least privileges necessary and isolate it within containerized or sandboxed environments to reduce the blast radius of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-14T17:23:35.259Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68790228a83201eaace61c00
Added to database: 7/17/2025, 2:01:12 PM
Last enriched: 7/17/2025, 2:17:00 PM
Last updated: 12/1/2025, 11:19:34 PM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66415: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in fastify fastify-reply-from
MediumCVE-2025-66448: CWE-94: Improper Control of Generation of Code ('Code Injection') in vllm-project vllm
HighCVE-2025-66401: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in kapilduraphe mcp-watch
CriticalCVE-2025-66312: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumCVE-2025-66311: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.