MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.
References
Link | Resource |
---|---|
https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0 | Release Notes |
https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-5xhm-4j3v-87m4 | Vendor Advisory Exploit |
Configurations
History
02 Aug 2025, 01:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:maxkb:maxkb:*:*:*:*:lts:*:*:* | |
Summary |
|
|
First Time |
Maxkb maxkb
Maxkb |
|
References | () https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0 - Release Notes | |
References | () https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-5xhm-4j3v-87m4 - Vendor Advisory, Exploit |
17 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-17 14:15
Updated : 2025-08-02 01:34
NVD link : CVE-2025-53927
Mitre link : CVE-2025-53927
CVE.ORG link : CVE-2025-53927
JSON object : View
Products Affected
maxkb
- maxkb
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')