CVE-2026-35002

Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agno:agno:*:*:*:*:*:*:*:*

History

16 Apr 2026, 17:41

Type Values Removed Values Added
References () https://github.com/agno-agi/agno/commit/cbf675521d4d2281925a051784a3b94172e56416 - () https://github.com/agno-agi/agno/commit/cbf675521d4d2281925a051784a3b94172e56416 - Patch
References () https://github.com/agno-agi/agno/releases/tag/v2.3.24 - () https://github.com/agno-agi/agno/releases/tag/v2.3.24 - Product
References () https://www.vulncheck.com/advisories/agno-field-type-eval-injection-arbitrary-code-execution - () https://www.vulncheck.com/advisories/agno-field-type-eval-injection-arbitrary-code-execution - Third Party Advisory
CPE cpe:2.3:a:agno:agno:*:*:*:*:*:*:*:*
First Time Agno agno
Agno
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

02 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 15:16

Updated : 2026-04-16 17:41


NVD link : CVE-2026-35002

Mitre link : CVE-2026-35002

CVE.ORG link : CVE-2026-35002


JSON object : View

Products Affected

agno

  • agno
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')