CVE-2025-9959

smol-agents · smol-agents

**A high-severity sandbox escape vulnerability in smol-agents allows an attacker to bypass the local Python execution environment, leading to arbitrary code execution on the host machine.**.

Executive summary

A high-severity sandbox escape vulnerability in smol-agents allows an attacker to bypass the local Python execution environment, leading to arbitrary code execution on the host machine.

Vulnerability

The software contains a flaw due to incomplete validation of dunder (double underscore) attributes in Python. An attacker with the ability to influence the Python code being executed within the sandbox can leverage this flaw to access and execute functions outside the restricted environment, achieving a full sandbox escape.

Business impact

With a CVSS score of 7.6 (High), this vulnerability poses a critical threat to systems running smol-agents. A successful sandbox escape would allow an attacker to execute arbitrary code with the permissions of the user running the agent. This could lead to data theft, installation of malware, or complete compromise of the underlying host system.

Remediation

Immediate Action: Update the smol-agents package to the latest patched version immediately. Discontinue use of the vulnerable version in any production or sensitive environment.

Proactive Monitoring: Monitor systems running smol-agents for any suspicious process execution, unexpected network connections, or file modifications that originate from the agent's process.

Compensating Controls: Run the smol-agents application within a further contained environment, such as a Docker container or a dedicated virtual machine, to limit the impact of a potential sandbox escape. Apply the principle of least privilege to the user account running the agent.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability to escape a security sandbox is a critical vulnerability that undermines the core security model of the application. All users of smol-agents must prioritize upgrading to the patched version to prevent potential host compromise. This is a severe flaw that requires immediate attention.