CVE-2026-27952

Agenta is an open-source LLMOps platform. In Agenta-API prior to version 0.48.1, a Python sandbox escape vulnerability existed in Agenta's custom code evaluator. Agenta used RestrictedPython as a sandboxing mechanism for user-supplied evaluator code, but incorrectly whitelisted the `numpy` package as safe within the sandbox. This allowed authenticated users to bypass the sandbox and achieve arbitrary code execution on the API server. The escape path was through `numpy.ma.core.inspect`, which exposes Python's introspection utilities — including `sys.modules` — thereby providing access to unfiltered system-level functionality like `os.system`. This vulnerability affects the Agenta self-hosted platform (API server), not the SDK when used as a standalone Python library. The custom code evaluator runs server-side within the API process. The issue is fixed in v0.48.1 by removing `numpy` from the sandbox allowlist. In later versions (v0.60+), the RestrictedPython sandbox was removed entirely and replaced with a different execution model.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:agentatech:agenta:*:*:*:*:*:*:*:*

History

02 Mar 2026, 18:43

Type Values Removed Values Added
CPE cpe:2.3:a:agentatech:agenta:*:*:*:*:*:*:*:*
References () https://github.com/Agenta-AI/agenta/security/advisories/GHSA-pmgp-2m3v-34mq - () https://github.com/Agenta-AI/agenta/security/advisories/GHSA-pmgp-2m3v-34mq - Exploit, Vendor Advisory
First Time Agentatech
Agentatech agenta

26 Feb 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-26 02:16

Updated : 2026-03-02 18:43


NVD link : CVE-2026-27952

Mitre link : CVE-2026-27952

CVE.ORG link : CVE-2026-27952


JSON object : View

Products Affected

agentatech

  • agenta
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')