CVE-2025-67511

Cybersecurity · Cybersecurity AI Multiple Products

A critical command injection vulnerability exists within the Cybersecurity AI (CAI) framework, affecting versions 0.5.9 and below.

Executive summary

A critical command injection vulnerability exists within the Cybersecurity AI (CAI) framework, affecting versions 0.5.9 and below. The flaw allows an attacker to execute arbitrary commands on the system running the AI agent by supplying malicious input for SSH connection parameters. Successful exploitation could lead to a complete system compromise, data theft, and significant operational disruption.

Vulnerability

The run_ssh_command_with_credentials() function within the Cybersecurity AI framework is vulnerable to command injection. The function fails to properly sanitize the username, host, and port parameters before incorporating them into a system shell command. An attacker who can influence the inputs provided to an AI agent can craft malicious values for these parameters (e.g., hostname; malicious_command) to execute arbitrary code on the server hosting the framework. This remote code execution occurs with the privileges of the user account running the Cybersecurity AI application.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6. Exploitation could lead to Remote Code Execution (RCE), giving an attacker full control over the affected server. Potential consequences include the theft or destruction of sensitive data, deployment of ransomware, disruption of security operations, and using the compromised system as a pivot point to attack other internal network resources. Given that the framework is used for security automation, its compromise could severely undermine an organization's entire security posture.

Remediation

Immediate Action: The vulnerability description notes that a fix is not available at the time of publication. Organizations should prepare to update Cybersecurity AI products to a patched version as soon as one is released by the vendor. In the interim, immediately begin monitoring for exploitation attempts by reviewing application and system access logs for any unusual inputs to the vulnerable function.

Proactive Monitoring:

  • Implement enhanced logging for the Cybersecurity AI application and monitor for any inputs to the run_ssh_command_with_credentials() function that contain shell metacharacters (e.g., ;, |, &, $(), `) in the username, host, or port fields.
  • Monitor servers running the framework for unexpected outbound network connections or the spawning of suspicious child processes (e.g., sh, bash, curl, wget).
  • Review system logs for anomalous command execution activity associated with the service account running the CAI framework.

Compensating Controls:

  • If possible, disable the run_ssh_command_with_credentials() function or restrict its use to only trusted, hard-coded parameters.
  • Implement strict input validation rules, potentially through a Web Application Firewall (WAF) or an intermediary application layer, to filter malicious characters from user-controllable inputs that are passed to the AI agents.
  • Run the Cybersecurity AI framework in a containerized or sandboxed environment with minimal privileges and restricted network access to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Due to the critical 9.6 CVSS score and the lack of an available patch, this vulnerability requires immediate attention. The highest priority is to implement compensating controls, such as input validation and enhanced monitoring, to reduce the risk of exploitation. Organizations must closely monitor all communications from Cybersecurity AI for the release of a security patch and be prepared to apply it on an emergency basis. Although not currently on the CISA KEV list, its high severity and potential impact make it a prime candidate for future inclusion, underscoring the urgency of mitigation.