Cyber Posture

CVE-2026-42076

Critical

Published: 04 May 2026

Published
04 May 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0040 60.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command injection vulnerability in the _extractLLM() function allows attackers to execute arbitrary shell commands on the server. The function constructs a curl command using string concatenation…

more

and passes it to execSync() without proper sanitization, enabling remote code execution when the corpus parameter contains shell metacharacters. This issue has been patched in version 1.69.3.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the corpus parameter to block shell metacharacters before constructing and executing the curl command, directly preventing command injection.

prevent

Mandates timely identification, reporting, and patching of the command injection flaw, enabling upgrade to the fixed version 1.69.3.

detect

Enables monitoring of the system to detect indicators of command injection attacks, such as unauthorized shell command executions via execSync().

Security SummaryAI

CVE-2026-42076 is a command injection vulnerability (CWE-78) affecting Evolver, a GEP-powered self-evolving engine for AI agents, in versions prior to 1.69.3. The issue resides in the _extractLLM() function, which constructs a curl command through unsafe string concatenation and executes it via execSync() without proper input sanitization. This allows attackers to inject shell metacharacters into the corpus parameter, leading to arbitrary shell command execution on the server. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.

The vulnerability is exploitable remotely over the network by unauthenticated attackers with no privileges or user interaction required. An attacker can craft a malicious corpus parameter containing shell metacharacters, such as command separators or backticks, to inject and execute arbitrary commands when the _extractLLM() function processes the input. Successful exploitation grants full remote code execution (RCE) on the affected server, potentially enabling data theft, persistence, or further compromise.

Mitigation is available in Evolver version 1.69.3, which patches the command injection flaw. Security practitioners should upgrade to this version immediately. Official details are provided in the GitHub security advisory (GHSA-j5w5-568x-rq53) and the release notes for v1.69.3.

As a component in AI agent workflows, this vulnerability highlights risks in self-evolving AI engines where unsanitized external inputs can propagate to system-level execution, though no public evidence of real-world exploitation has been reported.

Details

CWE(s)

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: ai

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in a network-accessible service directly enables T1190 (public-facing app exploitation for RCE/initial access) and T1059.004 (arbitrary Unix shell command execution via unsanitized execSync/curl).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References