CVE-2024-8487
- EPSS 0.05%
- Veröffentlicht 20.03.2025 10:11:26
- Zuletzt bearbeitet 01.04.2025 20:32:06
A Cross-Origin Resource Sharing (CORS) vulnerability exists in modelscope/agentscope version v0.0.4. The CORS configuration on the agentscope server does not properly restrict access to only trusted origins, allowing any external domain to make reque...
CVE-2024-8556
- EPSS 0.07%
- Veröffentlicht 20.03.2025 10:11:21
- Zuletzt bearbeitet 01.04.2025 20:31:16
A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run...
CVE-2024-8524
- EPSS 0.67%
- Veröffentlicht 20.03.2025 10:11:18
- Zuletzt bearbeitet 15.10.2025 13:15:54
A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint.
CVE-2024-8537
- EPSS 0.74%
- Veröffentlicht 20.03.2025 10:11:00
- Zuletzt bearbeitet 01.08.2025 01:50:54
A path traversal vulnerability exists in the modelscope/agentscope application, affecting all versions. The vulnerability is present in the /delete-workflow endpoint, allowing an attacker to delete arbitrary files from the filesystem. This issue aris...
CVE-2024-8551
- EPSS 0.24%
- Veröffentlicht 20.03.2025 10:10:21
- Zuletzt bearbeitet 01.08.2025 12:44:30
A path traversal vulnerability exists in the save-workflow and load-workflow functionality of modelscope/agentscope versions prior to the fix. This vulnerability allows an attacker to read and write arbitrary JSON files on the filesystem, potentially...
CVE-2024-8438
- EPSS 0.19%
- Veröffentlicht 20.03.2025 10:09:49
- Zuletzt bearbeitet 01.08.2025 01:49:54
A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server.
CVE-2024-8501
- EPSS 0.18%
- Veröffentlicht 20.03.2025 10:08:44
- Zuletzt bearbeitet 01.04.2025 20:31:58
An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This ...
CVE-2024-8550
- EPSS 0.09%
- Veröffentlicht 10.02.2025 19:15:39
- Zuletzt bearbeitet 30.07.2025 01:02:10
A Local File Inclusion (LFI) vulnerability exists in the /load-workflow endpoint of modelscope/agentscope version v0.0.4. This vulnerability allows an attacker to read arbitrary files from the server, including sensitive files such as API keys, by ma...
CVE-2024-48050
- EPSS 0.14%
- Veröffentlicht 04.11.2024 23:15:04
- Zuletzt bearbeitet 04.09.2025 16:26:54
In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.