Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27961: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in Agenta-AI agenta

0
High
VulnerabilityCVE-2026-27961cvecve-2026-27961cwe-1336
Published: Thu Feb 26 2026 (02/26/2026, 01:39:09 UTC)
Source: CVE Database V5
Vendor/Project: Agenta-AI
Product: agenta

Description

Agenta is an open-source LLMOps platform. A Server-Side Template Injection (SSTI) vulnerability exists in versions prior to 0.86.8 in Agenta's API server evaluator template rendering. Although the vulnerable code lives in the SDK package, it is executed server-side within the API process when running evaluators. This does not affect standalone SDK usage — it only impacts self-hosted or managed Agenta platform deployments. Version 0.86.8 contains a fix for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 10:04:59 UTC

Technical Analysis

CVE-2026-27961 is a Server-Side Template Injection (SSTI) vulnerability classified under CWE-1336, which involves improper neutralization of special elements used in a template engine. The vulnerability resides in the Agenta-AI platform, specifically in versions prior to 0.86.8, within the API server's evaluator template rendering component. Although the vulnerable code is part of the SDK package, the risk manifests only when the SDK is used in a server-side context within the API process, such as in self-hosted or managed Agenta deployments. The flaw allows an attacker with limited privileges (PR:L) to inject and execute arbitrary template code on the server without requiring user interaction. This can lead to full compromise of the server, including unauthorized access to sensitive data, modification or deletion of data, and disruption of service. The vulnerability has a CVSS v3.1 score of 8.8, reflecting its high impact and relatively low attack complexity. The issue was addressed in version 0.86.8 of Agenta, which includes proper sanitization and neutralization of template inputs to prevent injection. No public exploits or active exploitation have been reported, but the potential impact on confidentiality, integrity, and availability is severe, making timely patching critical.

Potential Impact

The SSTI vulnerability in Agenta's API server can lead to remote code execution, allowing attackers to fully compromise affected systems. This threatens the confidentiality of sensitive data processed or stored by the platform, the integrity of AI model evaluations and operational workflows, and the availability of the service itself. Organizations relying on Agenta for LLMOps risk data breaches, unauthorized manipulation of AI evaluation results, and potential lateral movement within their networks. Given the high CVSS score and the nature of the vulnerability, exploitation could result in significant operational disruption and reputational damage. The impact is amplified in environments where Agenta is integrated into critical AI infrastructure or handles sensitive intellectual property. The absence of known exploits in the wild suggests a window for proactive mitigation, but the risk remains high due to the ease of exploitation and the privileges required being relatively low.

Mitigation Recommendations

Organizations should immediately upgrade all Agenta deployments to version 0.86.8 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict access controls to limit API server evaluator usage to trusted users only, minimizing the risk of exploitation. Employ network segmentation to isolate Agenta servers from broader internal networks to contain potential breaches. Monitor logs for unusual template rendering requests or errors indicative of injection attempts. Conduct code reviews and security testing focused on template usage in custom evaluators. Disable or restrict evaluator functionality if not essential. Additionally, implement runtime application self-protection (RASP) or web application firewalls (WAFs) with rules targeting SSTI patterns to provide an additional layer of defense. Finally, maintain an incident response plan tailored to potential code injection attacks to enable rapid containment and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.792Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fabd8b7ef31ef0b7dea1a

Added to database: 2/26/2026, 2:11:36 AM

Last enriched: 3/5/2026, 10:04:59 AM

Last updated: 4/11/2026, 6:33:22 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses