Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution.
References
Configurations
History
16 Apr 2026, 17:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/agno-agi/agno/commit/cbf675521d4d2281925a051784a3b94172e56416 - Patch | |
| References | () https://github.com/agno-agi/agno/releases/tag/v2.3.24 - Product | |
| References | () https://www.vulncheck.com/advisories/agno-field-type-eval-injection-arbitrary-code-execution - Third Party Advisory | |
| CPE | cpe:2.3:a:agno:agno:*:*:*:*:*:*:*:* | |
| First Time |
Agno agno
Agno |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
02 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 15:16
Updated : 2026-04-16 17:41
NVD link : CVE-2026-35002
Mitre link : CVE-2026-35002
CVE.ORG link : CVE-2026-35002
JSON object : View
Products Affected
agno
- agno
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
