CVE-2026-25130: When 'Safe' Reconnaissance Turns into Remote Code Execution
Vulnerability ID: CVE-2026-25130
CVSS Score: 9.7
Published: 2026-01-30
A critical OS Command Injection vulnerability exists in the Cybersecurity AI (CAI) framework's find_file tool. By exploiting improper input neutralization in argument handling, attackers can leverage Prompt Injection to force AI agents into executing arbitrary system commands via the Unix find utility's -exec flag.
TL;DR
The 'find_file' tool in the CAI framework allows arbitrary arguments to be passed to the Unix 'find' command. Because this is executed with 'shell=True', an attacker can use Prompt Injection to pass '-exec' flags, achieving full Remote Code Execution (RCE) on the host machine.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-78
- Attack Vector: Network (Prompt Injection)
- CVSS Score: 9.7 (Critical)
- Vulnerability Type: OS Command Injection
- Exploit Status: PoC Available
- Platform: Python
Affected Systems
- Cybersecurity AI (CAI) Framework
- AI Agents using the
find_filetool -
Cybersecurity AI (CAI): <= 0.5.10 (Fixed in:
0.5.11 (Approximate))
Code Analysis
Commit: e22a122
Patch implementing blocklist for dangerous find flags
@@ -60,6 +60,11 @@
+ for flag in DANGEROUS_FIND_FLAGS:
+ if flag in args:
+ return f"Error: DANGEROUS flag '{flag}' is not allowed"
command = f'find {file_path} {args}'
Exploit Details
- Research Report: Prompt Injection leading to find -exec usage
Mitigation Strategies
- Input Validation: Blocklist known dangerous flags (-exec, -ok, -delete).
- Architecture: Run AI agents in ephemeral, sandboxed containers with no sensitive mounts.
- Least Privilege: Ensure the agent user has read-only access to the filesystem where possible.
- Human-in-the-Loop: Require manual approval for any command execution tools.
Remediation Steps:
- Update CAI framework to version > 0.5.10.
- Audit logs for past executions of
findcontaining-exec. - Restrict network egress for the agent container to prevent reverse shells.
References
Read the full report for CVE-2026-25130 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)