Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple...
Description
Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via `subprocess.Popen()` with `shell=True`, allowing attackers to execute arbitrary commands on the host system. The `find_file()` tool executes without requiring user approval because find is considered a "safe" pre-approved command. This means an attacker can achieve Remote Code Execution (RCE) by injecting malicious arguments (like -exec) into the args parameter, completely bypassing any human-in-the-loop safety mechanisms. Commit e22a1220f764e2d7cf9da6d6144926f53ca01cde contains a fix.
AI Analyst Comment
Remediation
Update Cybersecurity AI Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been identified in the Cybersecurity AI (CAI) framework, which could allow a remote attacker to take full control of an affected system. The flaw stems from the insecure handling of user-supplied data, enabling the execution of arbitrary commands without any user interaction or approval. This vulnerability poses a significant risk of complete system compromise, data theft, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2026-25130
Affected Software: Cybersecurity AI Multiple Products
Affected Versions: Versions up to and including 0.5.10
Vulnerability: The vulnerability is a critical argument injection flaw within the function tools of the Cybersecurity AI framework. The application improperly passes user-controlled input directly to system shell commands using
subprocess.Popen()withshell=True. An attacker can craft input that includes malicious shell command arguments. Specifically, thefind_file()tool, which is pre-approved as a "safe" command and requires no human-in-the-loop approval, can be exploited by injecting arguments like-execto execute arbitrary commands, leading to Remote Code Execution (RCE).Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.6. Successful exploitation grants an attacker full control over the host system, equivalent to the user running the CAI framework. The potential consequences include theft of sensitive data, deployment of ransomware, disruption of critical business operations, and using the compromised system as a pivot point to attack other internal network resources. The reputational damage to an organization relying on a compromised AI security product is also a significant risk.
Remediation Plan
Immediate Action: Immediately apply the vendor-supplied patch by updating all instances of Cybersecurity AI products to the latest version which contains the fix (referenced in commit e22a1220f764e2d7cf9da6d6144926f53ca01cde). After patching, review system and application logs for any signs of past exploitation attempts.
Proactive Monitoring: Monitor for suspicious process execution chains. Specifically, look for child processes spawned by the CAI application, such as
findexecuting unexpected commands (e.g.,sh,bash,curl,wget). Scrutinize network traffic originating from servers running the CAI framework for unusual outbound connections. Review shell command history and system audit logs for commands that may indicate a compromise.Compensating Controls: If immediate patching is not feasible, consider the following controls:
-exec.Exploitation Status
Public Exploit Available: False
Analyst Notes: As of the publication date of January 30, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity and the straightforward nature of the argument injection flaw, it is highly probable that proof-of-concept (PoC) exploits will be developed and made public quickly. Organizations should assume that threat actors will begin actively scanning for and exploiting this vulnerability in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.6 and the risk of unauthenticated Remote Code Execution, this vulnerability represents a severe and immediate threat to the organization. We strongly recommend that the vendor's patch be applied to all affected systems with the highest priority. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion. All remediation and monitoring actions should be initiated immediately to prevent a potential system compromise.