CVE-2025-8665: OS Command Injection in agno-agi agno
A vulnerability, which was classified as critical, has been found in agno-agi agno up to 1.7.5. This issue affects the function MCPTools/MultiMCPTools in the library libs/agno/agno/tools/mcp.py of the component Model Context Protocol Handler. The manipulation of the argument command leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8665 is a medium-severity OS command injection vulnerability found in the agno-agi project's product 'agno', specifically affecting versions 1.7.0 through 1.7.5. The vulnerability resides in the MCPTools/MultiMCPTools function within the Model Context Protocol Handler component, located in the library path libs/agno/agno/tools/mcp.py. The issue arises due to improper sanitization or validation of the 'command' argument, which allows an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), and the exploitability is partially limited by the requirement of low privileges (PR:L). Although the vendor was notified early, no response or patch has been provided, and no known exploits are currently reported in the wild. The public disclosure of the exploit code increases the risk of exploitation. The vulnerability's CVSS 4.0 base score is 5.3, categorizing it as medium severity. The lack of vendor response and absence of patches highlight the importance of proactive mitigation by users of affected versions. The vulnerability could allow attackers to execute arbitrary commands on the host system, potentially leading to unauthorized data access, system compromise, or disruption of services depending on the privileges of the exploited process.
Potential Impact
For European organizations using agno-agi's 'agno' software versions 1.7.0 to 1.7.5, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized command execution on critical systems, potentially compromising sensitive data confidentiality and system integrity. Given that the attack can be launched remotely without user interaction, attackers could leverage this flaw to establish persistent footholds or disrupt operations. The medium severity rating reflects limited privilege requirements but still presents a tangible threat, especially in environments where 'agno' is integrated into critical infrastructure or data processing workflows. The absence of vendor patches increases exposure, necessitating immediate risk management. European organizations in sectors such as telecommunications, research, or industrial control systems that rely on agno-agi's software may face operational disruptions or data breaches if exploited. Additionally, regulatory compliance frameworks in Europe, such as GDPR, mandate prompt action to mitigate vulnerabilities that could lead to data breaches, increasing the urgency for affected entities to address this issue.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement the following specific mitigations: 1) Immediate inventory and identification of all systems running affected agno versions (1.7.0 to 1.7.5). 2) Restrict network access to the affected MCPTools/MultiMCPTools service by implementing strict firewall rules and network segmentation to limit exposure to trusted sources only. 3) Employ application-layer filtering or input validation proxies to sanitize or block suspicious command inputs targeting the vulnerable function. 4) Run the affected service with the least privileges possible to minimize the impact of potential command execution. 5) Monitor logs and network traffic for unusual command execution patterns or anomalies indicative of exploitation attempts. 6) Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized command executions. 7) Engage in active threat hunting for indicators of compromise related to this vulnerability. 8) Plan for an upgrade or migration to a secure version once the vendor releases a patch or consider alternative software solutions if no patch is forthcoming. 9) Maintain regular backups and ensure incident response plans are updated to address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-8665: OS Command Injection in agno-agi agno
Description
A vulnerability, which was classified as critical, has been found in agno-agi agno up to 1.7.5. This issue affects the function MCPTools/MultiMCPTools in the library libs/agno/agno/tools/mcp.py of the component Model Context Protocol Handler. The manipulation of the argument command leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8665 is a medium-severity OS command injection vulnerability found in the agno-agi project's product 'agno', specifically affecting versions 1.7.0 through 1.7.5. The vulnerability resides in the MCPTools/MultiMCPTools function within the Model Context Protocol Handler component, located in the library path libs/agno/agno/tools/mcp.py. The issue arises due to improper sanitization or validation of the 'command' argument, which allows an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), and the exploitability is partially limited by the requirement of low privileges (PR:L). Although the vendor was notified early, no response or patch has been provided, and no known exploits are currently reported in the wild. The public disclosure of the exploit code increases the risk of exploitation. The vulnerability's CVSS 4.0 base score is 5.3, categorizing it as medium severity. The lack of vendor response and absence of patches highlight the importance of proactive mitigation by users of affected versions. The vulnerability could allow attackers to execute arbitrary commands on the host system, potentially leading to unauthorized data access, system compromise, or disruption of services depending on the privileges of the exploited process.
Potential Impact
For European organizations using agno-agi's 'agno' software versions 1.7.0 to 1.7.5, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized command execution on critical systems, potentially compromising sensitive data confidentiality and system integrity. Given that the attack can be launched remotely without user interaction, attackers could leverage this flaw to establish persistent footholds or disrupt operations. The medium severity rating reflects limited privilege requirements but still presents a tangible threat, especially in environments where 'agno' is integrated into critical infrastructure or data processing workflows. The absence of vendor patches increases exposure, necessitating immediate risk management. European organizations in sectors such as telecommunications, research, or industrial control systems that rely on agno-agi's software may face operational disruptions or data breaches if exploited. Additionally, regulatory compliance frameworks in Europe, such as GDPR, mandate prompt action to mitigate vulnerabilities that could lead to data breaches, increasing the urgency for affected entities to address this issue.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement the following specific mitigations: 1) Immediate inventory and identification of all systems running affected agno versions (1.7.0 to 1.7.5). 2) Restrict network access to the affected MCPTools/MultiMCPTools service by implementing strict firewall rules and network segmentation to limit exposure to trusted sources only. 3) Employ application-layer filtering or input validation proxies to sanitize or block suspicious command inputs targeting the vulnerable function. 4) Run the affected service with the least privileges possible to minimize the impact of potential command execution. 5) Monitor logs and network traffic for unusual command execution patterns or anomalies indicative of exploitation attempts. 6) Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized command executions. 7) Engage in active threat hunting for indicators of compromise related to this vulnerability. 8) Plan for an upgrade or migration to a secure version once the vendor releases a patch or consider alternative software solutions if no patch is forthcoming. 9) Maintain regular backups and ensure incident response plans are updated to address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-06T08:28:22.575Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68938e39ad5a09ad00f2dd60
Added to database: 8/6/2025, 5:17:45 PM
Last enriched: 8/6/2025, 5:32:46 PM
Last updated: 8/7/2025, 3:31:57 AM
Views: 9
Related Threats
CVE-2025-35970: Use of weak credentials in SEIKO EPSON Multiple EPSON product
HighCVE-2025-29866: CWE-73: External Control of File Name or Path in TAGFREE X-Free Uploader
HighCVE-2025-32094: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Akamai AkamaiGhost
MediumCVE-2025-8583: Inappropriate implementation in Google Chrome
MediumCVE-2025-8582: Insufficient validation of untrusted input in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.