CVE-2025-4032 – InclusionAI AWorld Os Command Injection Vulnerability

The following table lists the changes that have been made to the
CVE-2025-4032 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Apr. 28, 2025

    Action Type Old Value New Value
    Added Description A vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtual_environments/terminals/shell_tool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
    Added CVSS V4.0 AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
    Added CVSS V2 (AV:N/AC:H/Au:S/C:P/I:P/A:P)
    Added CWE CWE-78
    Added CWE CWE-77
    Added Reference https://github.com/inclusionAI/AWorld/issues/38
    Added Reference https://github.com/inclusionAI/AWorld/issues/38#issue-2996574433
    Added Reference https://github.com/inclusionAI/AWorld/issues/38#issuecomment-2806190923
    Added Reference https://vuldb.com/?ctiid.306395
    Added Reference https://vuldb.com/?id.306395
    Added Reference https://vuldb.com/?submit.559222
Share the Post:

Related Posts