CVE-2025-53927

MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:maxkb:maxkb:*:*:*:*:lts:*:*:*

History

02 Aug 2025, 01:34

Type Values Removed Values Added
CPE cpe:2.3:a:maxkb:maxkb:*:*:*:*:lts:*:*:*
Summary
  • (es) MaxKB es un asistente de IA de código abierto para empresas. Antes de la versión 2.0.0, las reglas de diseño de la sandbox no se podían eludir, ya que MaxKB solo restringía los permisos de ejecución de los archivos en un directorio específico. Por lo tanto, un atacante podía usar el método `shutil.copy2` en Python para copiar el comando que desea ejecutar al directorio ejecutable. Esto elude las restricciones de directorio y el shell inverso. La versión 2.0.0 soluciona este problema.
First Time Maxkb maxkb
Maxkb
References () https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0 - () https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0 - Release Notes
References () https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-5xhm-4j3v-87m4 - () https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-5xhm-4j3v-87m4 - Vendor Advisory, Exploit

17 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-17 14:15

Updated : 2025-08-02 01:34


NVD link : CVE-2025-53927

Mitre link : CVE-2025-53927

CVE.ORG link : CVE-2025-53927


JSON object : View

Products Affected

maxkb

  • maxkb
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')