Modelscope

Agentscope

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 20.03.2025 10:11:26
  • Zuletzt bearbeitet 01.04.2025 20:32:06

A Cross-Origin Resource Sharing (CORS) vulnerability exists in modelscope/agentscope version v0.0.4. The CORS configuration on the agentscope server does not properly restrict access to only trusted origins, allowing any external domain to make reque...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 20.03.2025 10:11:21
  • Zuletzt bearbeitet 01.04.2025 20:31:16

A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run...

Exploit
  • EPSS 0.67%
  • Veröffentlicht 20.03.2025 10:11:18
  • Zuletzt bearbeitet 15.10.2025 13:15:54

A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint.

Exploit
  • EPSS 0.74%
  • Veröffentlicht 20.03.2025 10:11:00
  • Zuletzt bearbeitet 01.08.2025 01:50:54

A path traversal vulnerability exists in the modelscope/agentscope application, affecting all versions. The vulnerability is present in the /delete-workflow endpoint, allowing an attacker to delete arbitrary files from the filesystem. This issue aris...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 20.03.2025 10:10:21
  • Zuletzt bearbeitet 01.08.2025 12:44:30

A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 20.03.2025 10:09:49
  • Zuletzt bearbeitet 01.08.2025 01:49:54

A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server.

Exploit
  • EPSS 0.18%
  • Veröffentlicht 20.03.2025 10:08:44
  • Zuletzt bearbeitet 01.04.2025 20:31:58

An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 10.02.2025 19:15:39
  • Zuletzt bearbeitet 30.07.2025 01:02:10

A Local File Inclusion (LFI) vulnerability exists in the /load-workflow endpoint of modelscope/agentscope version v0.0.4. This vulnerability allows an attacker to read arbitrary files from the server, including sensitive files such as API keys, by ma...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 04.11.2024 23:15:04
  • Zuletzt bearbeitet 04.09.2025 16:26:54

In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.