CVE-2025-8667: OS Command Injection in SkyworkAI DeepResearchAgent
A vulnerability, which was classified as critical, was found in SkyworkAI DeepResearchAgent up to 08eb7f8eb9505d0094d75bb97ff7dacc3fa3bbf2. Affected is the function from_code/from_dict/from_mcp of the file src/tools/tools.py. The manipulation leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8667 is a security vulnerability identified in the SkyworkAI DeepResearchAgent software, specifically affecting the function implementations from_code, from_dict, and from_mcp located in the src/tools/tools.py file. The vulnerability is an OS command injection flaw, which allows an attacker to inject and execute arbitrary operating system commands remotely. This type of vulnerability arises when untrusted input is improperly sanitized and passed to system-level command execution functions, enabling attackers to execute malicious commands on the host system. The affected version is indicated by the commit hash 08eb7f8eb9505d0094d75bb97ff7dacc3fa3bbf2, but due to the product’s continuous delivery model with rolling releases, precise versioning details are unavailable. The vendor has not responded to early disclosure attempts, and no patches or updates have been publicly released. The vulnerability has a CVSS 4.0 base score of 5.3, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:L), but with low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The continuous delivery and rolling release nature of the product complicate tracking and patching, potentially leaving many deployments vulnerable. The lack of vendor response and absence of patches further exacerbate the risk profile.
Potential Impact
For European organizations using SkyworkAI DeepResearchAgent, this vulnerability poses a significant risk. Successful exploitation could allow remote attackers to execute arbitrary OS commands, potentially leading to unauthorized data access, system compromise, lateral movement within networks, or disruption of services. Given the medium CVSS score and the low impact ratings, the immediate damage might be limited but still serious, especially in environments where the DeepResearchAgent is integrated with sensitive research data or critical infrastructure. The absence of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation in automated attacks. European entities involved in AI research, data analytics, or sectors relying on SkyworkAI’s tools could face confidentiality breaches or operational disruptions. Additionally, the lack of vendor patches means organizations must rely on internal mitigations, increasing operational overhead and risk. The continuous delivery model may also cause inconsistent patch levels across deployments, complicating vulnerability management. Overall, the vulnerability could undermine trust in AI research tools and expose sensitive intellectual property or personal data processed by the affected software.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict network access to the DeepResearchAgent service using firewalls or network segmentation to limit exposure to trusted hosts only. Employ strict input validation and sanitization at the application layer if possible, especially for any user-supplied data processed by the affected functions. Monitor system and application logs for unusual command execution patterns or anomalies indicative of exploitation attempts. Deploy host-based intrusion detection systems (HIDS) to detect suspicious OS command executions. Consider running the DeepResearchAgent in a sandboxed or containerized environment with minimal privileges to limit the impact of potential command injection. Regularly audit and update access controls to ensure only authorized personnel can interact with the service. Engage in active threat intelligence sharing within European cybersecurity communities to stay informed about emerging exploits. Finally, maintain readiness to apply vendor patches promptly once available and consider alternative tools if the risk is deemed unacceptable.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Switzerland
CVE-2025-8667: OS Command Injection in SkyworkAI DeepResearchAgent
Description
A vulnerability, which was classified as critical, was found in SkyworkAI DeepResearchAgent up to 08eb7f8eb9505d0094d75bb97ff7dacc3fa3bbf2. Affected is the function from_code/from_dict/from_mcp of the file src/tools/tools.py. The manipulation leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8667 is a security vulnerability identified in the SkyworkAI DeepResearchAgent software, specifically affecting the function implementations from_code, from_dict, and from_mcp located in the src/tools/tools.py file. The vulnerability is an OS command injection flaw, which allows an attacker to inject and execute arbitrary operating system commands remotely. This type of vulnerability arises when untrusted input is improperly sanitized and passed to system-level command execution functions, enabling attackers to execute malicious commands on the host system. The affected version is indicated by the commit hash 08eb7f8eb9505d0094d75bb97ff7dacc3fa3bbf2, but due to the product’s continuous delivery model with rolling releases, precise versioning details are unavailable. The vendor has not responded to early disclosure attempts, and no patches or updates have been publicly released. The vulnerability has a CVSS 4.0 base score of 5.3, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:L), but with low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The continuous delivery and rolling release nature of the product complicate tracking and patching, potentially leaving many deployments vulnerable. The lack of vendor response and absence of patches further exacerbate the risk profile.
Potential Impact
For European organizations using SkyworkAI DeepResearchAgent, this vulnerability poses a significant risk. Successful exploitation could allow remote attackers to execute arbitrary OS commands, potentially leading to unauthorized data access, system compromise, lateral movement within networks, or disruption of services. Given the medium CVSS score and the low impact ratings, the immediate damage might be limited but still serious, especially in environments where the DeepResearchAgent is integrated with sensitive research data or critical infrastructure. The absence of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation in automated attacks. European entities involved in AI research, data analytics, or sectors relying on SkyworkAI’s tools could face confidentiality breaches or operational disruptions. Additionally, the lack of vendor patches means organizations must rely on internal mitigations, increasing operational overhead and risk. The continuous delivery model may also cause inconsistent patch levels across deployments, complicating vulnerability management. Overall, the vulnerability could undermine trust in AI research tools and expose sensitive intellectual property or personal data processed by the affected software.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict network access to the DeepResearchAgent service using firewalls or network segmentation to limit exposure to trusted hosts only. Employ strict input validation and sanitization at the application layer if possible, especially for any user-supplied data processed by the affected functions. Monitor system and application logs for unusual command execution patterns or anomalies indicative of exploitation attempts. Deploy host-based intrusion detection systems (HIDS) to detect suspicious OS command executions. Consider running the DeepResearchAgent in a sandboxed or containerized environment with minimal privileges to limit the impact of potential command injection. Regularly audit and update access controls to ensure only authorized personnel can interact with the service. Engage in active threat intelligence sharing within European cybersecurity communities to stay informed about emerging exploits. Finally, maintain readiness to apply vendor patches promptly once available and consider alternative tools if the risk is deemed unacceptable.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-06T09:01:40.112Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68939c47ad5a09ad00f31c36
Added to database: 8/6/2025, 6:17:43 PM
Last enriched: 8/6/2025, 6:32:44 PM
Last updated: 8/8/2025, 12:38:57 AM
Views: 10
Related Threats
CVE-2025-8708: Deserialization in Antabot White-Jotter
LowCVE-2025-8707: Improper Export of Android Application Components in Huuge Box App
MediumCVE-2025-8706: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumCVE-2025-8705: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumCVE-2025-8704: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.